Peter Priller

Peter Priller
AVL LIST GMBH · Research and Technology

Dipl.Ing.

About

69
Publications
14,254
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
507
Citations
Citations since 2016
48 Research Items
492 Citations
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
Introduction
Peter Priller is Principal Technology Scout for Embedded Systems at Research and Technology Management of AVL List GmbH (Austria). His research interests are rooted in the CPS/IoT/IIoT area with focus on architectures, trust, scalability and security, extending to embedded ML, computer and wireless sensor networks (WSN).

Publications

Publications (69)
Conference Paper
Wireless Sensor Networks (WSNs) are at the verge of a broad acceptance in demanding industrial applications. Nodes must fulfill key requirements like reliability and deterministic communication, but also energy autarky in order to allow maintenance-free systems. In this paper a system combining low power, robust communication with appropriate metho...
Article
Full-text available
This paper presents a novel approach to improving wireless communications in harsh propagation environments to achieve higher overall reliability and durability of wireless battery powered sensor systems in the context of in-vehicle communication. The goal is to investigate the physical layer and establish an antenna recommendation system for a spe...
Patent
Auf einem Prüfcomputersystem (2) ausgeführtes Verfahren zur Sicherheitsüberprüfung einer Technikeinheit (1), wobei zumindest eine erste plausible Modellvariante und gegebenenfalls eine oder mehrere alternative Modellvarianten ermittelt werden und wobei das Verfahren die folgenden Schritte aufweist: Zuordnen bekannter Schwachstellen zu Komponenten d...
Patent
Full-text available
A method for establishing a communication connection between a network node and a communication partner in a data network is provided. The network node receives at least one message from the communication partner via a wireless interface and verification data are attached to the message. The verification data include a transmitter measured data ima...
Conference Paper
This paper describes the measurement setup for the proliferation of the vehicular communication systems in operating cars. The setup builds on a communication sniffer which detects cooperative awareness messages broadcast from ETSI ITS-G5 systems, decodes them and records the public information in these messages. The experimental characterization o...
Patent
Full-text available
Die Erfindung betrifft eine Vorrichtung zur Bereitstellung von elektrischer Energie, mit einer kalten Seite und einer warmen Seite, und zumindest einem zumindest teilweise halbleitenden Thermoelement.
Chapter
The collaborative activities of a diverse range of partners have resulted in a variety of assets directed towards trustworthy IoT and its integration into autonomous driving and Industry 4.0 applications. This paper strays away from technical development. Its motive is to establish a process and define an adequate set of high-level generic measures...
Preprint
Through international regulations (most prominently the latest UNECE regulation) and standards, the already widely perceived higher need for cybersecurity in automotive systems has been recognized and will mandate higher efforts for cybersecurity engineering. T he UNECE also demands the effectiveness of these engineering to be verified and validate...
Preprint
Full-text available
After more than a decade of intense focus on automated vehicles, we are still facing huge challenges for the vision of fully autonomous driving to become a reality. The same "disillusionment" is true in many other domains, in which autonomous Cyber-Physical Systems (CPS) could considerably help to overcome societal challenges and be highly benefici...
Patent
A method and apparatus for generating and updating a remote instance of a screen view for a communication device during a communication session. The screen view has a number of data elements that are presented on the screen view in accordance with a defined static or dynamic display schema. A display schema that at least partially corresponds to th...
Article
This letter presents, for the first time, a custom-built high frequency (HF) radio frequency identification (RFID) system that enables the communication with an RFID transponder (tag), which is attached to an object located in an enclosed metal housing. Proof-of-concept measurements of the custom-built HF RFID system show a good system performance...
Preprint
Full-text available
A continually growing number of sensors is required for monitoring industrial processes and for continuous data acquisition from industrial plants and devices. The cabling of sensors represent a considerable effort and potential source of error, which can be avoided by using wireless sensor nodes. These wireless sensor nodes form a wireless sensor...
Conference Paper
Full-text available
After more than a decade of intense focus on automated driving, we are still facing huge challenges for the vision of fully autonomuous driving to become a reality. The same ‘disillusionment’ is true in many other domains, in which autonomuous Cyber-Physical Systems (CPS) could considerably help to overcome societal challenges and be highly benefic...
Patent
Die Erfindung betrifft ein Verfahren zum Aufbau einer Kommunikationsverbindung zwischen einem Netzwerkknoten (1) und einem Kommunikationspartner (10) in einem Datennetz (6), wobei der Netzwerkknoten (1) zumindest eine Mitteilung (M) über eine Drahtlosschnittstelle (3) von dem Kommunikationspartner (10) empfängt und wobei der Mitteilung (M) Verifika...
Chapter
Preface Our future is the world we are going to live in, attracting our fantasies, speculations, fears and hopes. We really would like to know something about it and want to be prepared. Therefore, we observe trends. An obvious trend is that our world gets more and more connected. Information is seamlessly following and doing this quickly. We learn...
Conference Paper
Full-text available
Dependable communication is a cornerstone for industrial IoT applications. In hostile environments it is challenging to achieve a robust wireless communication link. This work investigates how the robustness of wireless communication can be improved by optimizing the design of antennas as well as the position of the antennas and sensors in the envi...
Conference Paper
Full-text available
Zusammenfassung Zur Überwachung von industriellen Prozessen und zur laufenden Messdatenerfassungen von Indust-rieanlagen und-Geräten werden immer mehr und mehr Sensoren benötigt. Diese Entwicklung wird vor allem durch industrielle Internet-of-Things (IoT) Anwendungen gleichzeitig ermöglicht und voran-getrieben. Die Verkabelung stellt einen erheblic...
Technical Report
Full-text available
Industrial partners of IoT4CPS (https://iot4cps.at) defined several use cases in their domain believed to benefit significantly from advances in secure, trusted (I)IoT. A brief analysis of these use cases and derived business needs of the opportunities addressed shall allow to focus research and development activities of IoT4CPS, by this the consor...
Patent
Full-text available
In order to manage with a smaller number of retransmissions of a data packet during attempts to reconstruct a data packet that has been incorrectly received in a wireless sensor network, it is proposed to implement in the receiving unit (2) a first method and a second method for reconstructing the incorrectly received data packet (DP), in a first s...
Preprint
Full-text available
Digitalization is proving to be a game changer in bridging the gap between the heterogeneous skills and markets. It increases productivity through optimisation over the entire supply chain and lets new services emerge through the convergence of applications domains. In this paper, we are providing a review of the main automotive trends and are high...
Poster
An application of TEDS with the extension of multiple energy profiles and the possibility to switch between them via an actuator channel was implemented on smart ultra low power transducers with the possibility to switch between two transmission protocols.
Conference Paper
For distributed measurements to be consistently aligned a global notion of time within the network is necessary. Clock synchronization performance is hampered by delays and jitter accumulated not only in the network, but also in the timestamping procedures of the devices being synchronized. The resources available on such sensors are often constrai...
Conference Paper
Full-text available
We present the design of a suite of protocols for wireless sensor networks (WSNs) with respect to a complete life cycle of a WSN node from warehouse to the end of operation. While there are numerous publications on various, usually isolated, aspects of WSNs, the whole life cycle of a node from registration in an automation system via warehouse, cal...
Chapter
In the course of the project the methods applied lead to the fact that it is required to utilize a) a service that authenticates machines reliably b) requires a firewall friendly protocol that is ISO/IEC 20922 c) that any architecture needs to be evaluated according to security and safety methods.
Conference Paper
The stringent constraint in any wireless communication system is the wireless channel itself. The indoor radio channel in an industrial environment exhibits a lot of multipath due to the prevalent metallic structures. In this research, an indoor radio channel is investigated in a severe multipath engine test bed environment. The study of this chann...
Patent
Full-text available
A method for validating a driver assistance system (3) of a (vehicle, wherein tests (T) defined by test parameters (P) are carried out for a predetermined test scenario (4), during a first test (T(n)) at least on test parameter (P) is determined, and to generate a second test (T(n+1)) the first test (T(n)) is altered in order to displace the first...
Article
Full-text available
This paper presents an ultra high frequency (UHF) radio frequency identification (RFID) reader for transponder (tag) localization in a selected environment—an AVL engine test bed. The choice of the UHF RFID reader hardware components is based on the evaluation of radio channel measurements in the engine test bed. The presented method of the channel...
Patent
Full-text available
Sensors in a test bench environment have to be parameterized in advance. This is a complex task that up to now has been performed mostly manually by a test bench engineer. In order to make the parameterization of a sensor easier, it is proposed that the position of the sensor on the object under test be ascertained through suitable localization met...
Conference Paper
In this research, a single-input multiple-output simulator for passive UHF RFID is developed in MatlabR/SimulinkR. Tag localization is achieved via a phase difference of arrival technique. A channel measurement campaign was conducted in an engine test environment. Scattering parameters were measured at several line-of-sight and non-line-of-sight ta...
Patent
Full-text available
The aim of the invention is to dispense with the need for a large number of retransmissions of a data packet defectively received in a wireless sensor network when attempting to reconstruct the data packet.
Conference Paper
Full-text available
Wireless sensor networks (WSNs) are typically used to measure physical quantities of their environment at locations characterized by poor accessibility and lacking of wired infrastructure. To extend the operational time, energy harvesting systems (EHSs) support the power supply by transforming environmental energy into electrical energy. In the bes...
Conference Paper
This paper presents a performance evaluation of a radio frequency identification (RFID) system in an indoor multipath environment at 890 MHz. A single input multiple output RFID system is investigated with respect to the feasibility of localizing tagged measurement equipment in an engine test bed. Based on the available signal power within the test...
Conference Paper
Full-text available
Verification and Validation (V&V) systems used in automotive engineering typically face two potentially contradicting design constraints: real-time capability versus scalability. While there has been substantial research on deterministic timing behavior, the software of such systems is usually designed statically to satisfy requirements available a...
Conference Paper
Full-text available
Increasing the efficiency of production and manufacturing processes is a key goal of initiatives like Industry 4.0. Within the context of the European research project ARROWHEAD, we enable and secure smart maintenance services. An overall goal is to proactively predict and optimize the Maintenance, Repair and Operations (MRO) processes carried out...
Conference Paper
Full-text available
Cyber-physical systems often include small wireless devices to measure physical quantities or control a technical process. These devices need a self-sufficient power supply because no wired infrastructure is available. Their operational time can be enhanced by energy harvesting systems. However, the convertible power is often limited and discontinu...
Article
Full-text available
Entwicklungen wie Web 2.0, Web 3.0 und Semantic Web haben nicht nur die Art und Weise verändert, wie Menschen miteinander interagieren. Durch den Einzug von Informations- und Kommunikationstechnologie in physische Produkte sowie in ihre Produktionsstätten werden auch Maschinen intelligenter und vernetzter. Aus mechatronischen Systemen entstehen zun...
Conference Paper
Full-text available
Europa has launched multiple initiatives and research projects to remain competitive in a globalized world and keep industry and manufacturing on-shore. Funded by EU and member countries, project ARROWHEAD[1] focuses research and innovation for collaborative automation using interoperable services for smart production, to improve quality, efficienc...
Patent
Full-text available
Systems and methods for recording an inventory of monitoring objects (1) of a plant (4) having a multiplicity of fixed or non-fixed areas (5) where monitoring objects (1) can be located. The plant (4) is suitable for carrying out sequences of operations using the monitoring objects (1) and has a multiplicity of detection devices (6) which are each...
Patent
Full-text available
A process for creating an executable configuration that can be run on a target system by selecting from a library a number of abstracted software components that are independent of the target system that implement individual functions of the target system and that are provided with a specified command interface and a specified interface to data cha...
Patent
Full-text available
A process for creating an executable configuration that can be run on a target system by selecting from a library a number of abstracted software components that are independent of the target system that implement individual functions of the target system and that are provided with a specified command interface and a specified interface to data cha...
Patent
Full-text available
Verfahren zur Erzeugung eines Modells einer Kommunikationsaufgabe (54) Eine Kommunikationsaufgabe in Form einer abstrakten Beschreibung wird automatisiert in ein Modell (1) umgewandelt, wobei die Relationen zwischen der Information in der abstrakten Beschreibung und den zielsystemunabhängigen Softwarekomponenten gespeichert werden, um Änderungen an...
Patent
Full-text available
A method for processing data or signals having different synchronization sources in a processing unit (1), in particular in a measuring, testing, or control device for the drive train or components thereof, characterized in that a time level (TL1, TLn) is introduced in the processing unit (1) for each synchronization source (SS1, SSn), with the clo...
Patent
Full-text available
A key and lock system has a key with an integrated transponder coil that is connected to a transponder unit, and a lock with an integrated write/read coil. The key has a key bit portion and a bow portion. When the key bit portion is inserted into an elongated aperture of a key cylinder of the lock, an axis of the write/read coil forms an acute angl...
Conference Paper
Mikron (Austria) presents a new, fully distributed access control system based on local RFID access points, combined with a CAN-based building network for synchronization of local controllers. A special application layer protocol is suggested for secure distribution, update and synchronization of access control lists, events, and multi-node activit...
Article
Full-text available
Automation systems (AS) are important tools for research and development. They are connected to the physical system under test via numerous sensors and actuators. Due to the ever increasing requirements in performance and functionality automated support in the configuration of the automation system's hardware and software components is desired. A p...

Network

Cited By

Projects

Projects (8)
Project
Future vehicles will cooperate via wireless networking to improve safety and reliability of road traffic. Each vehicle establishes a local view by means of its own sensors that will be extended by sensor data, object positions and traffic information received by wireless communications from other road users. The reliable communication range for this data exchange varies largely depending on the local environment of the vehicle and is currently unknown to the vehicles local advanced driver assistant (ADAS) and automated driving (AD) algorithms. The project RELEVANCE aims to solve this uncertainty enabling a vehicle to predict the reliable communication region in real-time as well as use this information for verification and validation (V&V) already during the development phase. We will (a) investigate the real-time prediction of the reliable wireless communication region using deep neural network methods, (b) provide an open dataset such that other groups can compete with our results, (c) develop a high-performance open-source computing reference framework to investigate supervised deep learning methods.
Project
AI + IoT = AIoT Artificial Intelligence of Things (AIoT) is the natural evolution for both Artificial Intelligence (AI) and Internet of Things (IoT) because they are mutually beneficial. AI increases the value of the IoT through machine learning by transforming the data into useful information, while the IoT increases the value of AI through connectivity and data exchange. Therefore, InSecTT – Intelligent Secure Trustable Things, a pan-European effort with 54 key partners from 12 countries (EU and Turkey), will provide intelligent, secure and trustworthy systems for industrial applications to provide comprehensive cost-efficient solutions of intelligent, end-to-end secure, trustworthy connectivity and interoperability to bring the Internet of Things and Artificial Intelligence together. InSecTT aims at creating trust in AI-based intelligent systems and solutions as a major part of the AIoT. Find more about InSecTT by going to https://www.insectt.eu/
Project
After more than a decade of intense focus on automated driving, we are still facing huge challenges for the vision of fully autonomuous driving to become a reality. The same ‘disillusionment’ is true in many other domains, in which autonomuous Cyber-Physical Systems (CPS) could considerably help to overcome societal challenges and be highly beneficial to society and individuals. In this White Paper, the authors have identified four challenges as being the main obstacles to realizing HAV: Realization of continuous, post-deployment systems improvement, handling of uncertainties and incomplete information, verification of HAV with machine learning components, and prediction. Each of these challenges is described in detail, including sub-challenges and, where appropriate, possible solutions to overcome them. By working together in a common effort between industry and academy and focussing on these challenges, the authors hope to contribute to overcome the ‘disillusionment’ for realizing HAV.