Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeroen Hoebeke is active.

Publication


Featured researches published by Jeroen Hoebeke.


Journal of Sensor and Actuator Networks | 2013

IETF Standardization in the Field of the Internet of Things (IoT): A Survey

Isam Ishaq; David Carels; Girum Ketema Teklemariam; Jeroen Hoebeke; Floris Van den Abeele; Eli De Poorter; Ingrid Moerman; Piet Demeester

Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities.


Eurasip Journal on Wireless Communications and Networking | 2013

Facilitating the creation of IoT applications through conditional observations in CoAP

Girum Ketema Teklemariam; Jeroen Hoebeke; Ingrid Moerman; Piet Demeester

With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things. The biggest challenge faced is the resource constraint of the smart objects to directly utilize the existing standard protocols and applications. A number of initiatives are currently witnessed to resolve this situation. One of such initiatives is the introduction of Constrained Application Protocol. This protocol is developed to fit in the resource-constrained smart object with the ability to easily translate to the prominent representational state transfer implementation, hypertext transfer protocol (and vice versa). The protocol has several optional extensions, one of them being, resource observation. With resource observation, a client may ask a server to be notified every state change of the resource. However, in many applications, all state changes are not significant enough for the clients. Therefore, the client will have to decide whether to use a value sent by a server or not. This results in wastage of the already constrained resources (bandwidth, processing power,…). In this paper, we introduced an alternative to the normal resource observation function, named Conditional Observation, where clients tell the servers the criteria for notification. We evaluated the power consumption and number of packets transmitted between clients and servers by using different network sizes and number of servers. In all cases, we found out that the existing observe option results in excessive number of packets (most of them unimportant for the client) and higher power consumption. We also made an extensive theoretical evaluation of the two approaches which give consistent result with the results we got from experimentation.


Wireless Personal Communications | 2015

Sensor Function Virtualization to Support Distributed Intelligence in the Internet of Things

Floris Van den Abeele; Jeroen Hoebeke; Girum Ketema Teklemariam; Ingrid Moerman; Piet Demeester

AbstractIt is estimated that—by 2020—billion devices will be connected to the Internet. nThis number not only includes TVs, PCs, tablets and smartphones, but also billions of embedded sensors that will make up the “Internet of Things” and enable a whole new range of intelligent services in domains such as manufacturing, health, smart homes, logistics, etc. To some extent, intelligence such as data processing or access control can be placed on the devices themselves. Alternatively, functionalities can be outsourced to the cloud. In reality, there is no single solution that fits all needs. Cooperation between devices, intermediate infrastructures (local networks, access networks, global networks) and/or cloud systems is needed in order to optimally support IoT communication and IoT applications. Through distributed intelligence the right communication and processing functionality will be available at the right place. The first part of this paper motivates the need for such distributed intelligence based on nshortcomings in typical IoT systems. The second part focuses on the concept of sensor function virtualization, a potential enabler for distributed intelligence, and presents solutions on how to realize it.


Sensors | 2017

LoRa scalability : a simulation model based on interference measurements

Jetmir Haxhibeqiri; Floris Van den Abeele; Ingrid Moerman; Jeroen Hoebeke

LoRa is a long-range, low power, low bit rate and single-hop wireless communication technology. It is intended to be used in Internet of Things (IoT) applications involving battery-powered devices with low throughput requirements. A LoRaWAN network consists of multiple end nodes that communicate with one or more gateways. These gateways act like a transparent bridge towards a common network server. The amount of end devices and their throughput requirements will have an impact on the performance of the LoRaWAN network. This study investigates the scalability in terms of the number of end devices per gateway of single-gateway LoRaWAN deployments. First, we determine the intra-technology interference behavior with two physical end nodes, by checking the impact of an interfering node on a transmitting node. Measurements show that even under concurrent transmission, one of the packets can be received under certain conditions. Based on these measurements, we create a simulation model for assessing the scalability of a single gateway LoRaWAN network. We show that when the number of nodes increases up to 1000 per gateway, the losses will be up to 32%. In such a case, pure Aloha will have around 90% losses. However, when the duty cycle of the application layer becomes lower than the allowed radio duty cycle of 1%, losses will be even lower. We also show network scalability simulation results for some IoT use cases based on real data.


IEEE Internet of Things Journal | 2017

Scalability Analysis of Large-Scale LoRaWAN Networks in ns-3

Floris Van den Abeele; Jetmir Haxhibeqiri; Ingrid Moerman; Jeroen Hoebeke

As LoRaWAN networks are actively being deployed in the field, it is important to comprehend the limitations of this low power wide area network technology. Previous work has raised questions in terms of the scalability and capacity of LoRaWAN networks as the number of end devices grows to hundreds or thousands per gateway. Some works have modeled LoRaWAN networks as pure ALOHA networks, which fails to capture important characteristics such as the capture effect and the effects of interference. Other works provide a more comprehensive model by relying on empirical and stochastic techniques. This paper uses a different approach where a LoRa error model is constructed from extensive complex baseband bit error rate simulations and used as an interference model. The error model is combined with the LoRaWAN MAC protocol in an ns-3 module that enables to study multichannel, multispreading factor, multigateway, bi-directional LoRaWAN networks with thousands of end devices. Using the LoRaWAN ns-3 module, a scalability analysis of LoRaWAN shows the detrimental impact downstream traffic has on the delivery ratio of confirmed upstream traffic. The analysis shows that increasing gateway density can ameliorate but not eliminate this effect, as stringent duty cycle requirements for gateways continue to limit downstream opportunities.


ad hoc networks | 2016

Observing CoAP groups efficiently

Isam Ishaq; Jeroen Hoebeke; Ingrid Moerman; Piet Demeester

It is envisioned that by the year 2020 the Internet will contain more than 50 billion devices, among which the majority of them will have constraints in terms of memory, processing power or energy. As a consequence, they are often unable to run current standard Internet protocols, requiring special, optimized protocols. A number of these protocols, covering the different layers of the protocol stack, have been developed and standardized lately. At the application level, the Constrained Application Protocol (CoAP) is proposed by the IETF as an HTTP replacement that is suitable for constrained devices. CoAP is a very light-weight base protocol that can be extended with optional specifications to satisfy specific use case needs. Two important optional specifications are observe, allowing monitoring of a CoAP resource over a period of time, and group communication, supporting interactions with multiple CoAP devices at once. Currently, these two optional specifications do not work together, i.e., it is not possible to gain the benefits of both of them at the same time. In this paper we present an alternative and novel approach to CoAP group communication that works well with the CoAP observe extension. In addition, it enables to perform operations on the observed results, bringing intelligence closer to the data sources.


Sensors | 2016

Experimental Evaluation of Unicast and Multicast CoAP Group Communication

Isam Ishaq; Jeroen Hoebeke; Ingrid Moerman; Piet Demeester

The Internet of Things (IoT) is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP) is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP), but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP.


symposium on communications and vehicular technology in the benelux | 2012

Leveraging upon standards to build the Internet of Things

Jeroen Hoebeke; David Carels; Isam Ishaq; Girum Ketema; Jen Rossey; Eli Depoorter; Ingrid Moerman; Piet Demeester

Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there were many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. Long time, most efforts were focusing on the networking layer. More recently, the IETF CoRE working group started working on an embedded counterpart of HTTP, allowing the integration of constrained devices into existing service networks. In this paper, we will briefly review the history of integrating constrained devices into the Internet, with a prime focus on the IETF standardization work in the ROLL and CoRE working groups. This is further complemented with some research results that illustrate how these novel technologies can be extended or used to tackle other problems.


Wireless Personal Communications | 2017

Sub-GHz LPWAN Network Coexistence, Management and Virtualization: An Overview and Open Research Challenges

Eli De Poorter; Jeroen Hoebeke; Matthias Strobbe; Ingrid Moerman; Steven Latré; Maarten Weyn; Bart Lannoo; Jeroen Famaey

The IoT domain is characterized by many applications that require low-bandwidth communications over a long range, at a low cost and at low power. Low power wide area networks (LPWANs) fulfill these requirements by using sub-GHz radio frequencies (typically 433 or 868xa0MHz) with typical transmission ranges in the order of 1 up to 50xa0km. As a result, a single base station can cover large areas and can support high numbers of connected devices (>1000 per base station). Notorious initiatives in this domain are LoRa, Sigfox and the upcoming IEEE 802.11ah (or “HaLow”) standard. Although these new technologies have the potential to significantly impact many IoT deployments, the current market is very fragmented and many challenges exists related to deployment, scalability, management and coexistence aspects, making adoption of these technologies difficult for many companies. To remedy this, this paper proposes a conceptual framework to improve the performance of LPWAN networks through in-network optimization, cross-technology coexistence and cooperation and virtualization of management functions. In addition, the paper gives an overview of state of the art solutions and identifies open challenges for each of these aspects.


international conference on embedded networked sensor systems | 2013

Building embedded applications via REST services for the internet of things

Floris Van den Abeele; Jeroen Hoebeke; Isam Ishaq; Girum Ketema Teklemariam; Jen Rossey; Ingrid Moerman; Piet Demeester

As embedded networks are evolving to open systems, its becoming possible to create new applications on top of these existing embedded systems. However, developing new applications can be difficult due to the large diversity of protocols that exist today. In this paper, the authors demonstrate how employing the CoAP protocol can enable rapid application development by re-using well-known principles from the Web development world. Furthermore, we also demonstrate how a number of extensions to CoAP help to lower the barrier for developing applications even further.

Collaboration


Dive into the Jeroen Hoebeke's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge