About
199
Publications
45,782
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,029
Citations
Introduction
Current research interests: edge computing; IoT; network mining; network architectures and protocols; in-network computation.
Additional affiliations
Education
January 2000 - March 2004
September 1996 - May 1999
September 1990 - July 1995
Publications
Publications (199)
After presenting a brief evolution of augmented reality applications from mobile systems (MARS) into mobile pervasive augmented reality systems (MPARS), this work addresses the reasons and aspects required to boost acceptance and use of mobile pervasive augmented reality systems for outdoor applications. The need to develop context-aware close-to-r...
This paper debates on notions of context-awareness as a relevant asset of networking and computing architectures for an Internet of Things (IoT), in particular in regards to a smoother support of the the networking operation between Cloud and Edge. Specifically, the paper debates on notions of context-awareness and goes over different types of cont...
This draft describes the Data reAchaBility BasEd Routing (DABBER)
protocol. DABBER aims to provide a name-based routing solution to
support the operation of Information-centric Networking frameworks in
opportunistic wireless networks. By "opportunistic wireless
networks" it is meant multi-hop wireless networks where finding an
end-to-end path betwe...
Wireless networks are today employed as com-
plementary access technology, implemented on the last hop
towards the Internet end-user. The shared media that wireless
deployments provide and which is relevant to interconnect
multiple users, has a limited technical design, as only one
device can be served per unit of time, design aspect which
limits t...
This paper presents a design formulation and evaluation of a wireless co-OFDMA probabilistic algorithm aimed at optimizing resource utilization in overlapping Wi-Fi networks. The design formulation is grounded in realistic industrial application requirements, and the evaluation is conducted using the network simulator v3.0 with its DetNetWiFi modul...
This perspective paper introduces a novel framework for container orchestration called CODECO. The CODECO orchestration framework relies on a data-network-computing approach to define the best infrastructure that can support the operation of next-generation Internet applications across a mobile, heterogeneous Edge-Cloud continuum. The selection of...
This chapter investigates the most recent advances in deterministic OFDMA- based Wi-Fi for industrial applications. It concentrates on techniques that provide deterministic support in industrial networks where Wi-Fi 6 is used as an additional technology to a deterministic wired core. It examines scenarios and traffic patterns that are expected to b...
Large-scale IoT environments have been growing fast via the advancement of 5G, 6G, advanced wireless standards, associated with advancements in multiple other technological fields. These environments, which are composed by a wide variety of cyber-physical systems, including sensors, actuators, mobile personal smartphones, have the capability to fur...
Manufacturing as a Service (MaaS) refers to a set of tools and processes that can assist the shared use of networked production facilities. In the core of this paradigm is a vision where manufacturing environments shall profit from an online set of tools and services that can be tailored to the requirements coming from the different manufacturers,...
This chapter debates on the use of Machine Learning (ML) to support edge-based semantic matchmaking to handle a large-scale integration of IoT data sources with IoT platforms. The chapter starts by addressing the interop-erability challenges currently faced by integrators, the role of ontologies in this context. It continues with a perspective on s...
6G is currently under definition, often being addressed from a plain telecommunications perspective as an evolutionary paradigm that represents an extension of 5G. Having as its horizon 2030, 6G initiatives are being deployed across the globe, to further ignite the development of 6G services. In its philosophy core, 6G embodies the "human in the lo...
Container orchestration handles the semi-automated management of applications across Edge-Cloud, providing features such as autoscaling, high availability, and portability. Having been developed for Cloud-based applications, container orchestration faces challenges in the context of decentralized Edge-Cloud environments, requiring a higher degree o...
In Industrial environments, such as factories, equipment are often connected through Ethernet or its complementary Time Sensitive Networking to support critical applications that require low latency and low jitter in the order of milliseconds. To meet these requirements, precise time synchronization across all wired devices is typically achieved us...
Presents information and current topics of interest to the global communications industry.
The main objective of this vision paper is to identify the steps to be followed to develop societal resilience towards short-term and long-term risks. The purpose is to showcase the best practices
and insights needed to (1) SENSE, (2) RESPOND, (3) DEFEND, and (4) RECOVER within the IoT domain by involving all key stakeholders of this value chain.
A...
Industrial Internet of Things (IIoT) systems require synchronized communication among
devices for sensing, computing, and actuation for some specific types of traffic. These
systems typically use a wired, deterministic infrastructure that offers tight synchroniza-
tion, bounded latency, and low to zero packet loss. To achieve these demands, precise...
The talk is about modeling deterministic wired/wireless environments in the context of flexible industrial IOT environments and is based on the ns-3 framework DetnetWiFi, developed by the fortiss IIoT team. The simulation framework is based on a realistic demonstrator available in the fortiss IIoT lab.
The publication includes a selection of current and future wireless technologies suitable for industrial use, providing an overview with valuable information on their performance including application-specific references. Thus, the handbook provides a useful and compact guide for the initial evaluation of industry-ready wireless communication techn...
Interoperability remains to be one of the main challenges in the Internet of Things. The increasing number of IoT data sources from various vendors augments the complexity of integrating different sensors and actuators on the existing platforms, requiring human involvement and becoming error prone. To improve this situation, devices are usually cou...
6G is currently under definition, being often addressed from a plain telecommunications perspective, as an evolutionary paradigm that represents an extension of 5G. Having as horizon 2030, 6G initiatives are being deployed across the globe, to further ignite the development of 6G services. In its philosophy core, 6G embodies the “human in the loop”...
This book presents the technologies that empower edge intelligence, along with their use in novel IoT solutions. Specifically, it presents how 5G/6G, Edge AI, and Blockchain solutions enable novel IoT-based decentralized intelligence use cases at the edge of the cloud/edge/IoT continuum. Emphasis is placed on presenting how these technologies suppo...
This paper provides an analysis of two machine learning algorithms, density-based spatial clustering of applications with noise (DBSCAN) and the local outlier factor (LOF), applied in the detection of outliers in the context of a continuous framework for the detection of points of interest (PoI). This framework has as input mobile trajectories of u...
The ns-3 DetNetWiFi framework (https://git.fortiss.org/iiot_external/detnetwifi-ns3) has the following components:
1. Modelling of TSN endpoints and TSN enabled switches interconnected to TSN WLAN regions; integration of the TAS based on Krumacker et al.
2. Target Wake Time based-scheduling
3. Timing Model providing support for Clocks per node.
4....
Manufacturing environments require tight synchronisation, which is usually supported at a local level via the Precision Time Protocol (PTP) across fixed industrial networks with good accuracy and precision. However, and due to the benefits of new wireless standards such as Wi-Fi 6/7, the industrial infrastructure will require tight time synchronisa...
This talk is focused on the debate concerning the need to support deterministic wireless services in industrial environments. For that purpose, the talk addresses the role of Time Sensitive Networking for Industrial Internet of Things environments, and discusses relevant mechanisms available in wireless (Wi-Fi~6, Wi-Fi 7) to meet Time Sensitive Net...
A key challenge in the context of Internet of Things (IoT) that remains to be solved is the lack of interoperability between cyber-physical systems offered by different vendors. An ever increasing number of active IoT devices increases the interoper- ability problem, considering large-scale sensing infrastructures, where devices from different vend...
This white paper provides an overview on the need and application of MQTT Sparkplug within the context of the European Connected Factory Platform for Agile Manufacturing. The white paper is directed towards researchers, developers, system integrators interested in understanding the role of MQTT Sparkplug and its operational use in manufacturing env...
Industrial Internet of Things Platforms enable the use of available data to improve production and business processes. However, the data exchange and provisioning between the data sources and platform services remain a challenge as such platforms are usually vendor specific, proprietary, and associated with specific IoT hardware. Therefore, we prop...
This paper addresses Wi-Fi 6 time-aware scheduling based on Target Wake Time (TWT) in a way that is compatible with the Time Sensitive Networking (TSN) Time-aware Shaper (TAS).
The paper proposes novel mechanisms and describes a proof-of-concept implementation. The implemented solution has been evaluated in terms of latency and jitter in a testbe...
This Special Section focused on gathering the most recent scientific research and insights on the evolution of communication architectures and protocols able to boost the creation of a truly global internet by means of the integration of the current internet with a new
Internet of Space
; how to support the operation of Tier-1, Tier-2, or even Ti...
A survey of Open Source Internet of Things projects, including an analysis of their features and community metrics
data-driven communications in IIoT
Organisations across a variety of industries rely today on the Internet of Things (IoT) to, on the one hand, increase operational efficiency and, on the other hand, to improve the overall decision making processes and increase the value-add of their products/business.
From a computer science perspective, IoT is a system of interconnected cyber-phy...
The purpose of this paper is to ignite a debate
regarding the need to support network service
composition in GAIA-X, in order to best support
current and future services, offered and consumed
in GAIA-X.
The position paper is organized into 4 sections.
After this brief introduction, Section 2 debates on
the GAIA-X architectural aspects supporting in...
IoT data exchange is supported today by different communication protocols and different protocolar frameworks, each of which with its own advantages and disadvantages, and often co-existing in a way that is mandated by vendor policies. Although different protocols are relevant in different domains, there is not a protocol that provides better perfo...
We propose an automated IoT data source (Thing) to service semantic matching mechanism that selects an optimal set of available IoT data sources in order to satisfy service requirements and needs. The main motivation is to provide a better use of data captured via IoT data sources. To achieve this goal, we propose a three-fold approach: (i) modelli...
https://www.ietf.org/id/draft-sofia-raw-industrialreq-00.html#name-authors-addresses
....................................................................................................................................
This document provides an overview on communication requirements for handling reliable wireless services within the context of indus...
This video provides a demonstration of the FTM-PTP code developed in fortiss for time synchronization across an Ethernet/TSN-Wi-Fi6/TSN infrastructure.
The demonstrator is part of the fortiss IIoT Lab.
We propose an automated IoT data source (Thing) to service semantic matching mechanism that selects an optimal set of available IoT data sources in order to satisfy service requirements and needs. The main motivation is to provide a better use of data captured via IoT data sources. To achieve this goal, we propose a threefold approach: (i) modeling...
This whitepaper provides an overview on semantic interoperability aspects within the context of Industrial Internet of Things (IIoT) by fortiss, specifically focusing on concepts that can assist a much needed automated integration of Operational Technology into Information Technology, from an end-to-end perspective. The whitepaper provides
the visi...
Mobile sensing has been gaining ground due to the increasing capabilities of mobile and personal devices that are carried around by citizens, giving access to a large variety of data and services based on the way humans interact. Mobile sensing brings several advantages in terms of the richness of available data, particularly for human activity rec...
Handling mobility management in the Internet is not trivial, given the heterogeneity of devices involved; providers involved; service requirements. The Internet evolution requires re-thinking mobility management and to understand how to best distribute functionality across the network.
The contributions of this book to research in the field concern...
Novel Internet of Things (IoT) requirements derived from a broader interconnection of heterogeneous devices have pushed the horizons of Cloud computing and are giving rise to a wider decentralisation of applications and data centers. An answer to the underlying network concerns, such as the need to lower the resulting latency due to heavy computati...
By natively supporting in-network caching and name-based forwarding, Information-Centric Networking (ICN) brings in features that are relevant to better support data transmission in opportunistic wireless networks. Such environments are highly challenged because of the node mobility and intermittent contacts. Therefore, forwarding packets to the ri...
Novel Internet of Things (IoT) requirements derived from a broader interconnection of heterogeneous devices have pushed the horizons of Cloud computing and are giving rise to a wider decentralisation of applications and data centers. An answer to the underlying network concerns, such as the need to lower the resulting latency due to heavy computati...
This work evaluates three Fog Computing data placement algorithms via experiments carried out with the iFogSim simulator. The paper describes the three algorithms (Cloud-only, Mapping, Edge-ward) in the context of an Internet of Things scenario, which has been based on an e-Health system with variations in applications and network topology. Results...
Activity recognition is an increasingly relevant topic
in the context of the most varied outdoor end-user services. In
outdoor environments, activity recognition based on close-to-real-
time information is key in providing awareness to the user about
their habits and thus to allow the user to better perform. Such
promptness is today provided via mu...
Activity recognition is an increasingly relevant topic in the context of the most varied end-user services. In outdoor environments, activity recognition based on close-to-real-time information is key in providing awareness to the user about their surroundings in a timely and user-friendly manner, thus allowing to the user to improve its overall us...
This paper contributes to the topic of mobility management anticipation via the exploitation of preferred network ranking utility functions. The work proposes, implements, and evaluates a set of ranking functions based on Quality of Service and Quality of Experience indicators. Such indicators are obtained via wireless overhearing, or via active ne...
IoT communication architectures and protocols have been evolving in order to cope with new challenges derived from environments involving a large number of heterogeneous, resource-constrained devices. Examples of such challenges are the support for intensive processing of large amounts of data; filtering; data mining and classification; high hetero...
This paper describes a software-based tool that tracks mobile node roaming and infers the time-to-handover as well as the preferential handover target, based on behavior inference solely derived from regular usage data captured in visited wireless networks. The paper presents the tool architecture; computational background for mobility estimation;...
In the context of social well-being and context awareness several eHealth applications have been focused on tracking activities, such as sleep or specific fitness habits, with the purpose of promoting physical well-being with increasing success. Sensing technology can, however, be applied to improve social well-being, in addition to physical well-b...
The architectural semantics of Information-Centric Networking bring in interesting features in regards to mobility management: Information-Centric Networking is content-oriented, connection-less, and receiver-driven. Despite such intrinsic advantages, the support for node movement is being based on the principles of IP solutions. IP-based solutions...
This chapter explores features, concepts, and provides guidelines concerning the role and applicability of smart data captured in a non-intrusive way, in the inference and contextualization of human behavior and interaction via pervasive wireless networking architectures.
Information-centric networking integrates by design a pull-based model which brings in advantages in terms of control as well as of in-network caching strategies. Currently, ICN main areas of action concern content distribution and IoT, both of which are environments that often require support for periodic and even-triggered data transmission. Such...
This work is dedicated to the analysis and development of a more robust support for Internet of Things data transmission, in particular, for personal Internet of Things environments, where data is more volatile and where devices exhibit highly mobile patterns. The work expects to contribute to context-aware edge computing mechanisms that lower late...
Information-centric networking integrates by design a pull-based model which brings in advantages in terms of control as well as of in-network caching strategies. Currently, ICN main areas of action concern content distribution and IoT, both of which are environments that often require support for periodic and even-triggered data transmission. Such...
Mobile sensing has been gaining ground due to the increasing capabilities of mobile, personal devices that are carried around by citizens, giving access to a large variety of data and services, all based on the way humans interact. Nevertheless, pervasive platforms used to capture and to infer human interaction are still designed in a simplistic wa...
The architectural semantics of \emph{Information-Centric Networking} bring in interesting features in regards to mobility management: Information-Centric Networking is content-oriented, connection-less, and receiver-driven. Despite such intrinsic advantages, the support for node movement is being based on the principles of IP solutions. IP-based so...
IoT scenarios rely on different IP-based communication protocols to assist data transmission among heterogeneous resource constrained devices. While such solutions are being applied by different vendors to different environments, there is yet not a generalized consensus on which solution best meets networking and service requirements. At the same t...
This poster describes DABBER, a protocol developed to extend the reach of Named Data Networking into wireless environments. Our key contribution lies in the fact that DABBER supports communication in op-portunistic wireless environments by relying on routing metrics that take into consideration node availability and centrality measures; data reacha...
Data classification in pervasive wireless networks is often tied to smart data captured from individual sources. Eager learner models are the ones mostly used in this context. However, activity recognition requires data fusion from multiple sources. In this case, data classification via eager learner methods gives rise to an increase in misclassifi...
We are living in the era of ubiquitous mobile phone development, devices which are already equipped with a variety of sensors. Such sensors are being used to assist the most varied aspects of our daily routines, including physical health conditions and proactive and ubiquitous personal management. In this PhD, we are proposing to conceive, and to v...
Augmented Reality (AR) is an increasingly prevalent
subject with various areas of application. This work explores the
results of a survey especially developed to document the ease of
acceptance of possible characteristics to implement in mobile
outdoor applications enhanced with AR. This survey has been
devised for a better assessment of user prefe...