Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thiemo Voigt is active.

Publication


Featured researches published by Thiemo Voigt.


local computer networks | 2004

Contiki - a lightweight and flexible operating system for tiny networked sensors

Adam Dunkels; Björn Grönvall; Thiemo Voigt

Wireless sensor networks are composed of large numbers of tiny networked devices that communicate untethered. For large scale networks, it is important to be able to download code into the network dynamically. We present Contiki, a lightweight operating system with support for dynamic loading and replacement of individual programs and services. Contiki is built around an event-driven kernel but provides optional preemptive multithreading that can be applied to individual processes. We show that dynamic loading and unloading is feasible in a resource constrained environment, while keeping the base system lightweight and compact.


local computer networks | 2006

Cross-Level Sensor Network Simulation with COOJA

Fredrik Österlind; Adam Dunkels; Joakim Eriksson; Niclas Finne; Thiemo Voigt

Simulators for wireless sensor networks are a valuable tool for system development. However, current simulators can only simulate a single level of a system at once. This makes system development and evolution difficult since developers cannot use the same simulator for both high-level algorithm development and low-level development such as device-driver implementations. We propose cross-level simulation, a novel type of wireless sensor network simulation that enables holistic simultaneous simulation at different levels. We present an implementation of such a simulator, COOJA, a simulator for the Contiki sensor node operating system. COOJA allows for simultaneous simulation at the network level, the operating system level, and the machine code instruction set level. With COOJA, we show the feasibility of the cross-level simulation approach


international conference on embedded networked sensor systems | 2006

Protothreads: simplifying event-driven programming of memory-constrained embedded systems

Adam Dunkels; Oliver Schmidt; Thiemo Voigt; Muneeb Ali

Event-driven programming is a popular model for writing programs for tiny embedded systems and sensor network nodes. While event-driven programming can keep the memory overhead down, it enforces a state machine programming style which makes many programs difficult to write, maintain, and debug. We present a novel programming abstraction called protothreads that makes it possible to write event-driven programs in a thread-like style, with a memory overhead of only two bytes per protothread. We show that protothreads significantly reduce the complexity of a number of widely used programs previously written with event-driven state machines. For the examined programs the majority of the state machines could be entirely removed. In the other cases the number of states and transitions was drastically decreased. With protothreads the number of lines of code was reduced by one third. The execution time overhead of protothreads is on the order of a few processor cycles.


international conference on embedded networked sensor systems | 2006

Run-time dynamic linking for reprogramming wireless sensor networks

Adam Dunkels; Niclas Finne; Joakim Eriksson; Thiemo Voigt

From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energy, memory, and processing power make sensor network reprogramming a challenging task. Many different mechanisms for reprogramming sensor nodes have been developed ranging from full image replacement to virtual machines.We have implemented an in-situ run-time dynamic linker and loader that use the standard ELF object file format. We show that run-time dynamic linking is an effective method for reprogramming even resource constrained wireless sensor nodes. To evaluate our dynamic linking mechanism we have implemented an application-specific virtual machine and a Java virtual machine and compare the energy cost of the different linking and execution models. We measure the energy consumption and execution time overhead on real hardware to quantify the energy costs for dynamic linkin.Our results suggest that while in general the overhead of a virtual machine is high, a combination of native code and virtual machine code provide good energy efficiency. Dynamic run-time linking can be used to update the native code, even in heterogeneous networks.


wired wireless internet communications | 2004

Connecting Wireless Sensornets with TCP/IP Networks

Adam Dunkels; Juan Alonso; Thiemo Voigt; Hartmut Ritter; Jochen H. Schiller

Wireless sensor networks are based on the collaborative efforts of many small wireless sensor nodes, which collectively are able to form networks through which sensor information can be gathered. Such networks usually cannot operate in complete isolation, but must be connected to an external network through which monitoring and controlling entities can reach the sensornet. As TCP/IP, the Internet protocol suite, has become the de-facto standard for large-scale networking, it is interesting to be able to connect sensornets to TCP/IP networks. In this paper, we discuss three different ways to connect sensor networks with TCP/IP networks: proxy architectures, DTN overlays, and TCP/IP for sensor networks. We conclude that the methods are in some senses orthogonal and that combinations are possible, but that TCP/IP for sensor networks currently has a number of issues that require further research before TCP/IP can be a viable protocol family for sensor networking.


IEEE Sensors Journal | 2013

Lithe: Lightweight Secure CoAP for the Internet of Things

Shahid Raza; Hossein Shafagh; Kasun Hewage; René Hummen; Thiemo Voigt

The Internet of Things (IoT) enables a wide range of application scenarios with potentially critical actuating and sensing tasks, e.g., in the e-health domain. For communication at the application layer, resource-constrained devices are expected to employ the constrained application protocol (CoAP) that is currently being standardized at the Internet Engineering Task Force. To protect the transmission of sensitive information, secure CoAP mandates the use of datagram transport layer security (DTLS) as the underlying security protocol for authenticated and confidential communication. DTLS, however, was originally designed for comparably powerful devices that are interconnected via reliable, high-bandwidth links. In this paper, we present Lithe-an integration of DTLS and CoAP for the IoT. With Lithe, we additionally propose a novel DTLS header compression scheme that aims to significantly reduce the energy consumption by leveraging the 6LoWPAN standard. Most importantly, our proposed DTLS header compression scheme does not compromise the end-to-end security properties provided by DTLS. Simultaneously, it considerably reduces the number of transmitted bytes while maintaining DTLS standard compliance. We evaluate our approach based on a DTLS implementation for the Contiki operating system. Our evaluation results show significant gains in terms of packet size, energy consumption, processing time, and network-wide response times when compressed DTLS is enabled.


simulation tools and techniques for communications, networks and system | 2009

COOJA/MSPSim: interoperability testing for wireless sensor networks

Joakim Eriksson; Fredrik Österlind; Niclas Finne; Nicolas Tsiftes; Adam Dunkels; Thiemo Voigt; Robert Sauter; Pedro José Marrón

Wireless sensor networks are moving towards emerging standards such as IP, ZigBee and WirelessHART which makes interoperability testing important. Interoperability testing is performed today through black-box testing with vendors physically meeting to test their equipment. Black-box testing can test interoperability but gives no detailed information of the internals in the nodes during the testing. Blackbox testing is required because existing simulators cannot simultaneously simulate sensor nodes with different firmware. For standards such as IP and WirelessHART, a white-box interoperability testing approach is desired, since it gives details on both performance and clues about why tests succeeded or failed. To allow white-box testing, we propose a simulation-based approach to interoperability testing, where the firmware from different vendors is run in the same simulator. We extend our MSPSim emulator and COOJA wireless sensor network simulator to support interoperable simulation of sensor nodes with firmware from different vendors. To demonstrate both cross-vendor interoperability and the benefits of white-box interoperability testing, we run the state-of-the-art Contiki and TinyOS operating systems in a single simulation. Because of the white-box testing, we can do performance measurement and power profiling over both operating systems.


ad hoc networks | 2013

SVELTE: Real-time intrusion detection in the Internet of Things

Shahid Raza; Linus Wallgren; Thiemo Voigt

In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. Currently, there are no IDSs that meet the requirements of the IPv6-connected IoT since the available approaches are either customized for Wireless Sensor Networks (WSN) or for the conventional Internet. In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE. In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding. However, our approach can be extended to detect other attacks. We implement SVELTE in the Contiki OS and thoroughly evaluate it. Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks. However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes. Also, SVELTEs overhead is small enough to deploy it on constrained nodes with limited energy and memory capacity.


distributed computing in sensor systems | 2011

Securing communication in 6LoWPAN with compressed IPsec

Shahid Raza; Simon Duquennoy; Tony Chung; Dogan Yazar; Thiemo Voigt; Utz Roedig

Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. It may also be necessary to encrypt sensor data in transit. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is possible. It is beneficial to use IPsec because the existing end-points on the Internet do not need to be modified to communicate securely with the WSN. Moreover, using IPsec, true end-to-end security is implemented and the need for a trustworthy gateway is removed. In this paper we provide End-to-End (E2E) secure communication between IP enabled sensor networks and the traditional Internet. This is the first compressed lightweight design, implementation, and evaluation of 6LoWPAN extension for IPsec. Our extension supports both IPsecs Authentication Header (AH) and Encapsulation Security Payload (ESP). Thus, communication endpoints are able to authenticate, encrypt and check the integrity of messages using standardized and established IPv6 mechanisms.


international symposium on computers and communications | 2004

Solar-aware clustering in wireless sensor networks

Thiemo Voigt; Adam Dunkels; Juan Alonso; Hartmut Ritter; Jochen H. Schiller

Energy conservation plays a crucial in wireless sensor networks since such networks are designed to be placed in hostile and nonaccessible areas. While battery-driven sensors will run out of battery sooner or later, the use of renewable energy sources such as solar power or gravitation may extend the lifetime of a sensor network. We propose to utilize solar power in wireless sensor networks and extend LEACH a well-known cluster-based protocol for sensor networks to become solar-aware. The presented simulation results show that making LEACH solar-aware significantly extends the lifetime of sensor networks.

Collaboration


Dive into the Thiemo Voigt's collaboration.

Top Co-Authors

Avatar

Kay Uwe Römer

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Adam Dunkels

Swedish Institute of Computer Science

View shared research outputs
Top Co-Authors

Avatar

Carlo Alberto Boano

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Nicolas Tsiftes

Swedish Institute of Computer Science

View shared research outputs
Top Co-Authors

Avatar

Joakim Eriksson

Swedish Institute of Computer Science

View shared research outputs
Top Co-Authors

Avatar

Shahid Raza

Swedish Institute of Computer Science

View shared research outputs
Top Co-Authors

Avatar

Niclas Finne

Swedish Institute of Computer Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fredrik Österlind

Swedish Institute of Computer Science

View shared research outputs
Top Co-Authors

Avatar

Marco Zuniga

Delft University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge