Computational Science Hub (CSH)
Permanent URI for this collectionhttps://hohpublica.uni-hohenheim.de/handle/123456789/16924
Browse
Browsing Computational Science Hub (CSH) by Classification "000"
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Publication Benchmarking of secure group communication schemes with focus on IoT(2024) Prantl, Thomas; Bauer, André; Engel, Simon; Horn, Lukas; Krupitzer, Christian; Iffländer, Lukas; Kounev, SamuelAs Internet of Things (IoT) devices become ubiquitous, they face increasing cybersecurity threats. Unlike standard 1-to-1 communication, the unique challenge posed by n-to-n communication in IoT is that messages must not be encrypted for a single recipient but for a group of recipients. For this reason, using Secure Group Communication (SGC) schemes is necessary to encrypt n-to-n communication efficiently for large group sizes. To this end, the literature presents various SGC schemes with varying features, performance profiles, and architectures, making the selection process challenging. A selection from this multitude of SGC schemes should best be made based on a benchmark that provides an overview of the performance of the schemes. Such a benchmark would make it much easier for developers to select an SGC scheme, but such a benchmark still needs to be created. This paper aims to close this gap by presenting a benchmark for SGC schemes that focus on IoT. Since the design of a benchmark first requires the definition of the underlying business problems, we defined suitable problems for using SGC schemes in the IoT sector as the first step. We identified a common problem for the centralized and decentralized/hybrid SGC schemes, whereas the distributed/contributory SGC schemes required defining an independent business problem. Based on these business problems, we first designed a specification-based benchmark, which we then extended to a hybrid benchmark through corresponding implementations. Finally, we deployed our hybrid benchmark in a typical IoT environment and measured and compared the performance of different SGC schemes. Our findings reveal notable impacts on calculation times and storage requirements without a trusted Central Instance (CI) in distributed/contributory SGC schemes.Publication Enabling adaptive food monitoring through sampling rate adaptation for efficient, reliable critical event detection(2025) Jox, Dana; Schweizer, Pia; Henrichs, Elia; Krupitzer, Christian; Jox, Dana; Department of Food Informatics and Computational Science Hub, University of Hohenheim, 70599 Stuttgart, Germany; Schweizer, Pia; Department of Food Informatics and Computational Science Hub, University of Hohenheim, 70599 Stuttgart, Germany; Niu, Jianwei; Department of Food Informatics and Computational Science Hub, University of Hohenheim, 70599 Stuttgart, Germany; Niu, JianweiMonitoring systems are essential in many fields, such as food production, storage, and supply, to collect information about applications or their environments to enable decision-making. However, these systems generate massive amounts of data that require substantial processing. To improve data analysis efficiency and reduce data collectors’ energy demand, adaptive monitoring is a promising approach to reduce the gathered data while ensuring the monitoring of critical events. Adaptive monitoring is a system’s ability to adjust its monitoring activity during runtime in response to internal and external changes. This work investigates the application of adaptive monitoring—especially, the adaptation of the sensor sampling rate—in dynamic and unstable environments. This work evaluates 11 distinct approaches, based on threshold determination, statistical analysis techniques, and optimization methods, encompassing 33 customized implementations, regarding their data reduction extent and identification of critical events. Furthermore, analyses of Shannon’s entropy and the oscillation behavior allow for estimating the efficiency of the adaptation algorithms. The results demonstrate the applicability of adaptive monitoring in food storage environments, such as cold storage rooms and transportation containers, but also reveal differences in the approaches’ performance. Generally, some approaches achieve high observation accuracies while significantly reducing the data collected by adapting efficiently.Publication Mechanisms to alleviate over-generalization in XCS for continuous-valued input spaces(2022) Wagner, Alexander R. M.; Stein, AnthonyIn the field of rule-based approaches to Machine Learning , the XCS classifier system (XCS) is a well-known representative of the learning classifier systems family. By using a genetic algorithm (GA), the XCS aims at forming rules or so-called classifiers which are as general as possible to achieve an optimal performance level. A too high generalization pressure may lead to over-general classifiers degrading the performance of XCS. To date, no method exists for XCS for real-valued input spaces (XCSR) and XCS for function approximation (XCSF) to handle over-general classifiers ensuring an accurate population. The Absumption mechanism and the Specify operator, both developed for XCS with binary inputs, provide a promising basis for over-generality handling in XCSR and XCSF. This paper introduces adapted versions of Absumption and Specify by proposing different identification and specialization strategies for the application in XCSR and XCSF. To determine their potential, the adapted techniques are evaluated in different classification problems, i.e., common benchmarks and real-world data from the agricultural domain, in a multi-step problem as well as different regression tasks. Our experimental results show that the application of these techniques leads to significant improvements of the accuracy of the generated classifier population in the applied benchmarks, data sets, multi-step problems and regression tasks, especially when they tend to form over-general classifiers. Furthermore, considering the working principle of the proposed techniques, the intended decrease in overall classifier generality can be confirmed.Publication Network impact analysis on the performance of Secure Group Communication schemes with focus on IoT(2024) Prantl, Thomas; Amann, Patrick; Krupitzer, Christian; Engel, Simon; Bauer, André; Kounev, SamuelSecure and scalable group communication environments are essential for many IoT applications as they are the cornerstone for different IoT devices to work together securely to realize smart applications such as smart cities or smart health. Such applications are often implemented in Wireless Sensor Networks, posing additional challenges. Sensors usually have low capacity and limited network connectivity bandwidth. Over time, a variety of Secure Group Communication (SGC) schemes have emerged, all with their advantages and disadvantages. This variety makes it difficult for users to determine the best protocol for their specific application purpose. When selecting a Secure Group Communication scheme, it is crucial to know the model’s performance under varying network conditions. Research focused so far only on performance in terms of server and client runtimes. To the best of our knowledge, we are the first to perform a network-based performance analysis of SGC schemes. Specifically, we analyze the network impact on the two centralized SGC schemes SKDC and LKH and one decentralized/contributory SGC scheme G-DH. To this end, we used the ComBench tool to simulate different network situations and then measured the times required for the following group operations: group creation, adding and removing members. The evaluation of our simulation results indicates that packet loss and delay influence the respective SGC schemes differently and that the execution time of the group operations depends more on the network situations than on the group sizes.Publication On the structural analysis and optimal input design for joint state and parameter estimation(2025) Lepsien, Arthur; Kügler, Philipp; Schaum, AlexanderThis paper addresses the problem of joint state and parameter estimation for nonlinear affine-input systems with positive parameters including the design of a closed-loop optimal input adaptation to increase an identifiability measure for the system. The identifiability itself is considered in the context of structural observability of the system dynamics based on structural analysis of the system including the unknown parameters as additional states. In particular, the network graph-based interpretation of structural observability is employed at this point. This analysis motivates to include time derivatives of the measurements as additional system outputs to enhance the structural observability properties. For this purpose robust exact differentiation is considered, relying on the super-twisting algorithm to obtain finite time convergent estimates of these signals. Using the extended measurement signal, a continuous-discrete Extended Kalman filter is proposed that ensures strictly positive estimates for the parameters. Based on the estimates of states and parameters the input signal is determined using a moving horizon optimal predictive control that evaluates the condition number of the Fisher information matrix, thus maximizing the information content of the measurements with respect to the parameters. The proposed scheme extends and combines different previously discussed approaches from the literature and is evaluated by means of a thermal process example in simulation and experiment, showing high potential for similar system identification problems.Publication Recommendation of secure group communication schemes using multi-objective optimization(2023) Prantl, Thomas; Bauer, André; Iffländer, Lukas; Krupitzer, Christian; Kounev, SamuelThe proliferation of IoT devices has made them an attractive target for hackers to launch attacks on systems, as was the case with Netflix or Spotify in 2016. As the number of installed IoT devices is expected to increase worldwide, so does the potential threat and the importance of securing these devices and their communications. One approach to mitigate potential threats is the usage of the so-called Secure Group Communications (SGC) schemes to secure the communication of the devices. However, it is difficult to determine the most appropriate SGC scheme for a given use case because many different approaches are proposed in the literature. To facilitate the selection of an SGC scheme, this work examines 34 schemes in terms of their computational and communication costs and their security characteristics, leading to 24 performance and security features. Based on this information, we modeled the selection process for centralized, distributed, and decentralized schemes as a multi-objective problem and used decision trees to prioritize objectives.
