Carsten Buschmann’s research while affiliated with University of Lübeck and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (51)


Figure 1. Overall system structure.
Table 1 . Used sensor node types.
Figure 2. The visualization program Spyglass. 
Figure 3. Hardware components of a clusterhead. 
Table 3 . Approximate energy demand of different node types used.

+11

Critical Infrastructure Surveillance Using SecureWireless Sensor Networks
  • Article
  • Full-text available

November 2015

·

418 Reads

·

11 Citations

Journal of Sensor and Actuator Networks

·

·

·

[...]

·

In this work, a secure wireless sensor network (WSN) for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept, which includes both security on the communication level, as well as mechanisms that ensure the functional safety during its operation. While there are many theoretical approaches in various subdomains of WSNs—like network structures, communication protocols and security concepts—the construction, implementation and real-life application of these devices is still rare. This work deals with these aforementioned aspects, including all phases from concept-generation to operation of a secure wireless sensor network. While the key focus of this paper lies on the security and safety features of the WSN, the detection, localization and classification capabilities resulting from the interaction of the nodes’ different sensor types are also described.

Download

Poster Abstract: iBAST-Instantaneous Bridge Assessment Based on Sensor Network Technology

December 2014

·

220 Reads

Lecture Notes in Electrical Engineering

This poster presents the iBAST project, the goal of which is the continuous monitoring of highway bridges with sensor network technology. Currently working on a first individual solution, the long term goal of the project, though, is to move from individual case studies towards a comprehensive monitoring of bridges, by developing a monitoring system which can be easily and cost-effectively customized for every bridge. This poster abstract presents the system architecture and implementation as well as first results.


MOVEDETECT - Secure Detection, Localization and Classification in Wireless Sensor Networks

August 2013

·

59 Reads

·

7 Citations

Lecture Notes in Computer Science

In this paper a secure wireless sensor network (WSN) developed within the MOVEDETECT project is presented. The goal of the project was to design, implement and demonstrate a secure WSN for the protection of critical infrastructure. In order to provide a reliable service, the system must detect any kind of tampering with the sensor nodes, prevent eavesdropping and manipulation of the communication as well as detect, track and classify intruders in the protected region. Therefore based on previous experiences, a real-world WSN was developed, which addresses practical issues like water proofing, energy consumption, sensor deployment and visualization of the WSN state, but also provides a unique security concept, a interesting combination of sensors and sophisticated sensor data processing and analysis. The system was evaluated by examining firstly the sensors and the sensor processing algorithms and then conducting realistic field test.


Selective Reprogramming in Sensor Networks

February 2011

·

18 Reads

This paper introduces a selective reprogramming scheme for wireless sensor networks, which is reliable, robust and scalable. Selective wireless code replacements are mandatory for real-world deployments where no wired connections exist to a majority of the nodes and where different hardware or different roles lead to a heterogeneous network. The presented scheme is based on the idea that nodes to be updated share missing program parts with each other. We show by real-world experiments and simulations that it reduces the duration of the update process and the number of transmitted messages compared to related work. Even in extremely lossy networks, it reprograms 225 nodes in less than 120 seconds.


Efficient and Effective XML Encoding

January 2010

·

8 Reads

Compared to other middleware approaches like CORBA or Java RMI the protocol overhead of SOAP is very high. This fact is not only disadvantageous for several performance-critical applications, but especially in environments with limited network bandwidth or resource-constrained computing devices. Although recent research work concentrated on more compact, binary representations of XML data only very few approaches account for the special characteristics of SOAP communication. This chapter will discuss the most relevant state-of-the-art technologies for compressing XML data. Furthermore, it will present a novel solution for compacting SOAP messages. In order to achieve significantly better compression rates than current approaches, the compressor described in this chapter utilizes structure information from an XML Schema or WSDL document. With this additional knowledge on the “grammar” of the exchanged messages, this compressor generates a single custom pushdown automaton, which can be used as a highly efficient validating parser as well as a highly effective compressor. The main idea is to tag the transitions of the automaton with short binary identifiers that are then used to encode the path through the automaton during parsing. The authors’ approach leads to extremely compact data representations and is also usable in environments with very limited CPU and memory resources.


Solar Powered Sensor Network Design and Experimentation

October 2009

·

33 Reads

·

12 Citations

As battery capacities are a key limiting factor of wireless sensor networks, harvesting energy from the environment is very attractive. For outdoor applications, solar power seems to be the best suited energy source. However, the amount of energy delivered from the sun changes significantly over the year, which makes the dimensioning of the panel difficult. In this paper we discuss the most important impact factors and introduce a model that predicts the harvested solar power and the battery charge over the year. In addition, we present experimental results of the first six month of our long term experiments for validating our model.



Towards Service Orientation on Resource Constrained Devices

January 2009

·

12 Reads

For the flexible integration of enterprise applications and business processes, the Service Oriented Architecture (SOA) concept and the web service technology are the state of the art today. Especially for powerful hardware, a lot of web service and related technologies were developed during the last years. But with the development of Future Internet technologies, there is a demand for integrating all kinds of devices into a SOA. This includes especially devices with extremely limited resources, such as wireless sensor nodes, which are not capable of running today's web service technologies. In this paper we disclose the need for research action on different layers of the web service technology stack. We discuss promising solutions for running standard compliant web services in sensor networks and integrating sensor network and enterprise IT web services as well as BPEL business processes seamlessly. We introduce the L2D2 project in which our concept will be realized and proven.


XML Compression for Web Services on Resource-Constrained Devices

January 2009

·

11 Reads

Compared to other middleware approaches like CORBA or Java RMI the protocol overhead of SOAP is very high. This fact is not only disadvantageous for several performance-critical applications, but especially in environments with limited network bandwidth or resource-constrained computing devices. Although recent research work concentrated on more compact, binary representations of XML data only very few approaches account for the special characteristics of SOAP communication. In this article we will discuss the most relevant state-of-the-art technologies for compressing XML data. Furthermore, we will present a novel solution for compacting SOAP messages. In order to achieve significantly better compression rates than current approaches, our compressor utilizes structure information from an XML Schema or WSDL document. With this additional knowledge on the “grammar” of the exchanged messages, our compressor generates a single custom pushdown automaton, which can be used as a highly efficient validating parser as well as a highly efficient compressor. The main idea is to tag the transitions of the automaton with short binary identifiers that are then used to encode the path trough the automaton during parsing. Our approach leads to extremely compact data representations and is also usable in environments with very limited CPU and memory resources.


Integrating a Decentralized Web Service Discovery System into the Internet Infrastructure

December 2008

·

17 Reads

·

9 Citations

A weak point of web services is the lack of suitable technologies for implementing service registries. Universal description, discovery and integration (UDDI), as a centralized approach, conflicts with the distributed nature of service-oriented architectures and did not prevail in practice. Hence, in this paper we propose an architecture for discovering and locating web services using the domain name system (DNS). After a detailed survey on current technologies for finding services we present a novel service discovery scheme that is easy to implement and scalable at the same time. Each service provider runs one or more discovery proxies in its Internet domain and sets DNS records pointing to them. Then, local services can register at these proxies. Service users from the local network as well as from the Internet can now locate these proxies using the DNS and query them for available services in this domain. Thus, the local proxies are linked together by the DNS forming one coherent global service directory.


Citations (27)


... However, with optimized schema-based approaches , higher compression rates can be realized while exploiting the structure of XML documents. microFi- bre [10] and Xenia [13] are two schema-based compressors realizing compression ratios up to 98% compared to plain XML. Web Services in WSNs have not been researched much. ...

Reference:

Self-Description and Protocol Conversion for a Web of Things
Advanced Data Compression Techniques for SOAP Web Services
  • Citing Article
  • January 2007

... The availability of the nodes is not addressed directly by topological considerations and only relies on the robust design and diagnostic coverage of the sensor node. The authenticity of the communicating entities is not part of their concept [14]. If a sensor node within their proposed network architecture fails, there is no fallback defined. ...

Critical Infrastructure Surveillance Using SecureWireless Sensor Networks

Journal of Sensor and Actuator Networks

... To ensure its applicability for critical infrastructure monitoring, in this paper, the involved sensors are comprehensively evaluated and tested in both laboratory environment and live field trials. This paper improves our previous work [33] by implementing functional safety / self-protection functions and adding energy supply awareness. Further, this paper also includes laboratory tests for adaptive frequency hopping, communication robustness and functional safety. ...

MOVEDETECT - Secure Detection, Localization and Classification in Wireless Sensor Networks
  • Citing Conference Paper
  • August 2013

Lecture Notes in Computer Science

... It automates the tedious process of data encoding and data type implementation for various target platforms and programming languages. We have implemented microFibre as a module for FABRIC [4], our data type-centric middleware synthesis framework. ...

Data-type centric middleware synthesis for wireless sensor network application development
  • Citing Article
  • January 2006

... This technology is also used in the field of powering wireless sensors to avoid the use of conventional batteries which need to be periodically replaced or recharged. The electrical energy for running these types of devices could be obtained from various potential energy sources available in the ambient environment, such as, for example, solar energy [3][4][5], thermal energy [6][7][8], mechanical vibration energy [9][10][11] like wind energy [12,13], acoustic energy [14][15][16], and ocean waves [17][18][19]. Harvesting these energies will help in providing an infinite lifetime energy of power generation. ...

Solar Power Harvesting - Modeling and Experiences

... Middleware architectures fulfilling organic computing principles are rare. In [3], the use of middleware for self-healing is investigated, but none of the presented approaches deals with fabric automation. Another approach towards an organic middleware is AMUN developed at the university of Augsburg [8]. ...

Middleware for Swarm-Like Collections of Devices
  • Citing Article

... They assume the unit disk model and works in uniformly and randomly deployed WSN. The enhanced version of NIDES presented in [38] adapted the ratio by taking into account the number of one-hop neighbors of Y and heuristically stated that it could be applied in arbitrary radio models. ...

Radio Propagation-Aware Distance Estimation Based on Neighborhood Comparison
  • Citing Conference Paper
  • January 1970

... The connectivity-based methods infer distances from local connectivity information among different nodes in WSNs [15,22,23]. The neighborhood intersection distance estimation scheme (NIDES) presented in [22] heuristically relates the distance, e.g. from node A to node B, to an easily observed ratio, i.e. the number of their common immediate neighbors to the number of immediate neighbors of A, and then performs distance estimation at node A according to this ratio and other a priori known information. ...

Estimating Distances Using Neighborhood Intersection
  • Citing Conference Paper
  • October 2006