Change search
Link to record
Permanent link

Direct link
BETA
Punal, Pablo
Alternative names
Publications (10 of 10) Show all publications
Carlsson, O., Puñal Pereira, P., Eliasson, J., Delsing, J., Ahmad, B., Harrison, R. & Jansson, O. (2016). Configuration Service in Cloud based Automation Systems. In: IECON Proceedings (Industrial Electronics Conference): . Paper presented at 42nd Conference of the Industrial Electronics Society, IECON 2016, Florence, Italy, 24-27 October 2016 (pp. 5238-5245). Piscataway, NJ: IEEE Computer Society, Article ID 7793489.
Open this publication in new window or tab >>Configuration Service in Cloud based Automation Systems
Show others...
2016 (English)In: IECON Proceedings (Industrial Electronics Conference), Piscataway, NJ: IEEE Computer Society, 2016, p. 5238-5245, article id 7793489Conference paper, Published paper (Refereed)
Abstract [en]

Current challenges in production automation requires the involvement of new technologies like Internet of Things (IoT), Systems of Systems and local automation clouds. The objective of this paper is to address one of the challenges involved in establishing and managing a cloud based automation system. Three key capabilities have been identified as required to create the expected benefits of local automation clouds; 1) capturing of plant design 2) capturing and distributing configuration and deployment information 3) coordinating information exchange.

This paper addresses the capturing and distribution of configuration and deployment information. For this purpose a system service is proposed, the ConfigurationStore, following the principles of the Arrowhead Framework. The service is accompanied by a deployment methodology and a bootstrapping procedure. These are discussed for several types of automation technology, e.g. controllers, sensors, actuators. A qualitative evaluation of the proposed approach is made for four use cases; Building automation, Manufacturing automation, Process automation and IoT devices. Concluding the usability for large-scale deployment and configuration of Industrial Internet of Things.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Computer Society, 2016
Series
IEEE Industrial Electronics Society, ISSN 1553-572X
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering Embedded Systems
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-59691 (URN)10.1109/IECON.2016.7793489 (DOI)000399031205084 ()2-s2.0-85010069971 (Scopus ID)
Conference
42nd Conference of the Industrial Electronics Society, IECON 2016, Florence, Italy, 24-27 October 2016
Projects
Arrowhead
Available from: 2016-10-12 Created: 2016-10-12 Last updated: 2017-11-24Bibliographically approved
Puñal Pereira, P. (2016). Efficient IoT Framework for Industrial Applications. (Doctoral dissertation). Luleå
Open this publication in new window or tab >>Efficient IoT Framework for Industrial Applications
2016 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The use of low-power wireless sensors and actuators with networking support in in-dustry has increased over the past decade. New generations of microcontrollers, new hardware for communication, and the use of standardized protocols such as the Internet Protocol have resulted in more possibilities for interoperability than ever before. This in-creasing interoperability allows sensors and actuator nodes to exchange information with large numbers of peers, which is beneficial for creating advanced, flexible and reusable systems.The increase in interoperability has resulted in an increase in the number of possible attacks from malicious devices or users. For this reason, the use of encryption techniques to protect client and server communications has become mandatory. However, even with state-of-the-art encryption mechanisms, there is no protection that can control access to each particular service with fine-grained precision. The nodes within an industrial network of wireless sensors and actuators are resource-constrained embedded devices, and increasing interoperability therefore requires a higher level of computation capabil-ities. The nodes’ intrinsic limitations of memory and processing exert an adverse effect on power consumption and communication delays, resulting in a shorter battery life-time. Therefore, the standard computing solutions for Internet communications are not directly applicable, and new mechanisms to achieve security, scalability, dependability, interoperability and energy efficiency are needed.Sensor and actuator networks can transmit sensed data, but they also offer access to the actuators. Such accesses, presumably provided via services, require an access protection scheme. For this reason, the use of access control mechanisms is mandatory. Access control assists in the creation of customized services and access policies. These access policies can isolate access permissions to devices with different roles, such as production and maintenance.The main contribution of this thesis is a novel, efficient IoT framework for industrial applications, including design, implementation, and experimental validation. The frame-work includes features for communication protection, authentication, fine-grained access control, zero-configuration networking, and run-time reconfiguration. These technologies and their corresponding energy consumption data clearly demonstrate the feasibility of integrating a battery-operated IoT concept into a functional System of Systems. The provided data also pinpoint the most critical areas for improvement.

Place, publisher, year, edition, pages
Luleå: , 2016
Series
Doctoral thesis / Luleå University of Technology 1 jan 1997 → …, ISSN 1402-1544
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-95 (URN)978-91-7583-665-2 (ISBN)978-91-7583-666-9 (ISBN)
Supervisors
Available from: 2016-09-08 Created: 2016-09-08 Last updated: 2018-03-07Bibliographically approved
Punal, P., Eliasson, J. & Delsing, J. (2015). An Authentication and Access Control Framework for CoAP-based Internet of Things (ed.). In: (Ed.), (Ed.), IECON 2014: 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA , Oct. 29 2014 - Nov. 1 2014. Paper presented at Annual Conference of the IEEE Industrial Electronics Society : 29/10/2014 - 01/11/2014 (pp. 5293-5299). Piscataway, NJ: IEEE Communications Society
Open this publication in new window or tab >>An Authentication and Access Control Framework for CoAP-based Internet of Things
2015 (English)In: IECON 2014: 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA , Oct. 29 2014 - Nov. 1 2014, Piscataway, NJ: IEEE Communications Society, 2015, p. 5293-5299Conference paper, Published paper (Refereed)
Abstract [en]

Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, and more and more products are starting to appear on the market. Research has shown that the use of Service Oriented Architecture (SOA) can enable distributed application and devices to device com- munication, even on very resource constrained devices, and thus play an important role for IoT and CPS.In order to realize the vision of Internet of Things, communica- tion between devices must be secured. Security mechanisms for resource constrained devices has attracted much interest from the academic community, where research groups have shown solutions like IPsec, VPN-tunnels, (D)TLS, etc. are feasible to use on this type of networks. However, even though the use of well- known security mechanisms are vital for SOA-based IoT/CPS networks and systems to be protected, they do not provide any fine-grain access control.In this paper, a CoAP-based framework for service-level access control on low-power devices is presented. The framework allows fine grain access control on a per service and method basis. For example, by using this approach a device can allow read/write access to its services to one group of users while only allowing read access to another group. Users without the right credentials are not even allowed to discover available services. To demonstrate the validity of the proposed approach, several implementations are presented together with test results.The aim is to provide a holistic framework for secure SOA- based low power networks comprise by resource constrain devices.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2015
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-32899 (URN)10.1109/IECON.2014.7049308 (DOI)2-s2.0-84949926376 (Scopus ID)78d95c1a-4181-49e8-bb9c-6f97cca4ca89 (Local ID)9781479940325 (ISBN)78d95c1a-4181-49e8-bb9c-6f97cca4ca89 (Archive number)78d95c1a-4181-49e8-bb9c-6f97cca4ca89 (OAI)
Conference
Annual Conference of the IEEE Industrial Electronics Society : 29/10/2014 - 01/11/2014
Projects
Arrowhead
Note
Godkänd; 2015; 20140625 (pabpun)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Delsing, J., Eliasson, J., Punal, P. & Gebart, J. (2015). The IoT Rockbolt (ed.). Paper presented at IoT conference : 26/10/2015 - 28/10/2015. Paper presented at IoT conference : 26/10/2015 - 28/10/2015.
Open this publication in new window or tab >>The IoT Rockbolt
2015 (English)Conference paper, Oral presentation only (Refereed)
Abstract [en]

The use of rock bolts in the mining industry is a widely used approach for increasing mine stability. Here we demonstrate an IoT rockbolt with strain and accelerometer sensors. By utilizing the real-time monitoring capabilities of a network of IoT rockbolts, open up for drastically improve monitoring of mining activities and thereby providing real time logistics and operational information while at the same time provide working safety information.

National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics; Intelligent industrial processes (AERI)
Identifiers
urn:nbn:se:ltu:diva-33141 (URN)7edff507-5678-44b6-8366-ff9323d390f8 (Local ID)7edff507-5678-44b6-8366-ff9323d390f8 (Archive number)7edff507-5678-44b6-8366-ff9323d390f8 (OAI)
Conference
IoT conference : 26/10/2015 - 28/10/2015
Projects
I2Mine
Note
Godkänd; 2015; 20151102 (jerker)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2017-11-25Bibliographically approved
Derhamy, H., Eliasson, J., Delsing, J., Varga, P. & Punal, P. (2015). Translation Error Handling for Multi-Protocol SOA Systems (ed.). In: (Ed.), (Ed.), Proceedings of 2015 IEEE 20th International Conference on Emerging Technologies & Factory Automation (ETFA 2015): Luxembourg, 8-11 Sept. 2015. Paper presented at IEEE International Conference on Emerging Technologies and Factory Automation : 08/09/2015 - 11/09/2015. Piscataway, NJ: IEEE Communications Society, Article ID 7301473.
Open this publication in new window or tab >>Translation Error Handling for Multi-Protocol SOA Systems
Show others...
2015 (English)In: Proceedings of 2015 IEEE 20th International Conference on Emerging Technologies & Factory Automation (ETFA 2015): Luxembourg, 8-11 Sept. 2015, Piscataway, NJ: IEEE Communications Society, 2015, article id 7301473Conference paper, Published paper (Refereed)
Abstract [en]

The IoT research area has evolved to incorporate aplethora of messaging protocol standards, both existing and new,emerging as preferred communications means. The variety ofprotocols and technologies enable IoT to be used in manyapplication scenarios. However, the use of incompatiblecommunication protocols also creates vertical silos and reducesinteroperability between vendors and technology platformproviders. In many applications, it is important that maximuminteroperability is enabled. This can be for reasons such asefficiency, security, end-to-end communication requirements etc.In terms of error handling each protocol has its own methods,but there is a gap for bridging the errors across protocols.Centralized software bus and integrated protocol agents are usedfor integrating different communications protocols.However, the aforementioned approaches do not fit well in allIndustrial IoT application scenarios. This paper thereforeinvestigates error handling challenges for a multi-protocol SOAbasedtranslator. A proof of concept implementation is presentedbased on MQTT and CoAP. Experimental results show thatmulti-protocol error handling is possible and furthermore anumber of areas that need more investigation have beenidentified.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2015
Series
I E E E International Conference on Emerging Technologies and Factory Automation. Proceedings, ISSN 1946-0740
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-32804 (URN)10.1109/ETFA.2015.7301473 (DOI)2-s2.0-84952950775 (Scopus ID)7672198f-f488-44a9-ad2e-18b6678af3fc (Local ID)978-1-4673-7929-8 (ISBN)7672198f-f488-44a9-ad2e-18b6678af3fc (Archive number)7672198f-f488-44a9-ad2e-18b6678af3fc (OAI)
Conference
IEEE International Conference on Emerging Technologies and Factory Automation : 08/09/2015 - 11/09/2015
Note
Validerad; 2016; Nivå 1; 20150605 (hasder)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Eliasson, J., Punal, P., Mäkitaavola, H., Delsing, J., Nilsson, J. & Gebart, J. (2014). A Feasibility Study of SOA-enabled Networked Rock Bolts (ed.). In: (Ed.), Proceedings of 2014 IEEE 19th International Conference on Emerging Technologies & Factory Automation (ETFA 2014): Barcelona, Spain, 16-19 Sept. 2014. Paper presented at International Conference on Emerging Technologies & Factory Automation : 16/09/2014 - 19/09/2014 (pp. 1-8). Piscataway, NJ: IEEE Communications Society, Article ID 7005072.
Open this publication in new window or tab >>A Feasibility Study of SOA-enabled Networked Rock Bolts
Show others...
2014 (English)In: Proceedings of 2014 IEEE 19th International Conference on Emerging Technologies & Factory Automation (ETFA 2014): Barcelona, Spain, 16-19 Sept. 2014, Piscataway, NJ: IEEE Communications Society, 2014, p. 1-8, article id 7005072Conference paper, Published paper (Refereed)
Abstract [en]

The use of rock bolts in the mining industry is a widely used approach for increasing mine stability. However, when compared to the automation industry, where the use of sensors and real-time monitoring of processes have evolved rapidly, the use rock bolts have not changed a lot during the last 100 years. What is missing are technologies for keeping installed rock bolts under real-time and online monitoring. One problem is that rock bolts can become damaged by seismic activities or movements within the rock, and thus lose their load bearing capacity. If that happens, the outer shell of a tunnel’s walls or ceiling can collapse, with disaster as a result. Therefore, there is a clear need for online and real-time monitoring solutions for strain and thereby stress, as well as seismic activity. In this paper, the current state of art in research around intelligent rock bolts is presented. An intelligent rock bolt is the combination of a traditional rock bolt with an Internet of Things device, i.e. a rock bolt with embedded sensors, actuators, processing capabilities and wireless communication. In the proposed architecture, every rock bolt has its own IPv6 address and can establish a wireless mesh network in an ad-hoc manner. Bymeasuring strain and seismic activity and exposing the sensors in the form of services, large gains in terms of safety and efficiently can be achieved. A number of mining related activities such as stress on the rock bolt can be detected, falling rocks and the presence of mobile machinery can be observed. Since the network is based on standard communication protocols such as IPv6, it is vital to add security mechanisms to prevent eavesdropping and tampering of data traffic. By utilizing the real-time monitoring capabilities of a network of Internet-connected intelligent rock bolt, it is possible to drastically improve monitoring of mining activities and thereby providing workers with a safer working environment.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2014
Series
IEEE Emerging Technology and Factory Automation (ETFA)
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-31759 (URN)10.1109/ETFA.2014.7005072 (DOI)000360999100023 ()84946689484 (Scopus ID)6066743b-088b-46c4-ae3d-da49bd25816a (Local ID)978-1-4799-4845-1 (ISBN)6066743b-088b-46c4-ae3d-da49bd25816a (Archive number)6066743b-088b-46c4-ae3d-da49bd25816a (OAI)
Conference
International Conference on Emerging Technologies & Factory Automation : 16/09/2014 - 19/09/2014
Projects
Arrowhead, I2Mine
Note

Validerad; 2015; Nivå 1; 20140320 (jench)

Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2017-11-25Bibliographically approved
Punal, P. (2014). An Efficient Access Control Method for Resource Constrained Embedded Systems (ed.). (Licentiate dissertation). Paper presented at . : Luleå tekniska universitet
Open this publication in new window or tab >>An Efficient Access Control Method for Resource Constrained Embedded Systems
2014 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The way to communicate and distribute the information in Wireless Sensor Networks (WSN) is constantly under evolution; at beginning the networks sent the information using proprietary protocols; but today, using IP protocol has become widely used to improve the interoperability and to standardize. These nodes often are constrained re- source devices and are not able to use the same mechanisms that a normal computer uses, because the processing performance and memory capacity are smaller than a nor- mal computer.With standardized protocols, like CoAP, an embedded device is able to create and offer resources to others. In some applications the data is confidential and must be pro- tected against intruders, for this reason the use of encryption techniques is mandatory; but even with encryption there is no mechanism to control the access to each resource and with method is used to access. Also standard computing solutions are not directly applicable, because the power consumption and processing performance. Therefore all resources are accessible to anyone with permissions to connect to the embedded device.In this thesis a new method of access control for resource-constrained devices is pro- posed as a extension of CoAP protocol. Which keep the original concepts of low-power and small processing overhead.This method can be a small step forward on the WSNs evolution. The results obtained are only about the method, the integration of this method into a complete access control framework is part of future work.

Place, publisher, year, edition, pages
Luleå tekniska universitet, 2014. p. 138
Series
Licentiate thesis / Luleå University of Technology, ISSN 1402-1757
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-17997 (URN)64e62958-e5a2-48af-b90d-fd96c16c6854 (Local ID)978-91-7583-009-4 (ISBN)978-91-7583-010-0 (ISBN)64e62958-e5a2-48af-b90d-fd96c16c6854 (Archive number)64e62958-e5a2-48af-b90d-fd96c16c6854 (OAI)
Note
Godkänd; 2014; 20140915 (pabpun); Nedanstående person kommer att hålla licentiatseminarium för avläggande av teknologie licentiatexamen. Namn: Pablo Puñal Pereira Ämne: Industriell elektronik/Industrial Electronics Uppsats: An Efficient Access Control Method for Resource Constrained Embedded Systems Examinator: Biträdande professor Jens Eliasson, Institutionen för system- och rymdteknik, Luleå tekniska universitet Diskutant: Biträdande professor Panos Papadimitratos, School of Electrical Engineering, KTH, Stockholm Tid: Måndag den 20 oktober 2014 kl 10.00 Plats: A109, Luleå tekniska universitetAvailable from: 2016-09-29 Created: 2016-09-29 Last updated: 2017-11-24Bibliographically approved
Kyusakov, R., Punal, P., Eliasson, J. & Delsing, J. (2014). EXIP: A Framework for Embedded Web Development (ed.). Paper presented at . ACM Transactions on the Web (TWEB), 8(4), Article ID 23.
Open this publication in new window or tab >>EXIP: A Framework for Embedded Web Development
2014 (English)In: ACM Transactions on the Web (TWEB), ISSN 1559-1131, E-ISSN 1559-114X, Vol. 8, no 4, article id 23Article in journal (Refereed) Published
Abstract [en]

Developing and deploying Web applications on networked embedded devicesis often seen as a way to reduce the development cost and time to marketfor new target platforms. However, the sizeof the messages and the processing requirements of today's Web protocols, such as HTTP and XML,are challenging for the most resource-constrained class of devicesthat could also benefit from Web connectivity.New Web protocols using binary representations have been proposedfor addressing this issue. Constrained Application Protocol (CoAP)reduces the bandwidth and processing requirementscompared to HTTP while preserving the core concepts of the Web architecture.Similarly, Efficient XML Interchange (EXI) format has been standardizedfor reducing the size and processing time for XML structured information.Nevertheless, the adoption of these technologies is lagging behind due to lack ofsupport from web browsers and current Web development toolkits.Motivated by these problems, this article presents the design and implementationtechniques for the EXIP framework for embedded Web development. The frameworkconsists of a highly efficient EXI processor, a tool for EXI data binding basedon templates, and a CoAP/EXI/XHTML Web page engine.A prototype implementation of the EXI processor is hereinpresented and evaluated. It can be applied to Web browsersor thin server platforms using XHTML and Web servicesfor supporting human-machine interactions with constrained hosts.This article contains four major results: (1) theoretical and practical evaluation of the use of binary protocolsfor embedded Web programming; (2) a novelmethod for generation of EXI grammars based on XML Schema definitions;(3) an algorithm for grammar concatenationthat produces normalized EXI grammars directly, and hence reducesthe number of iterations during grammar generation;(4) an algorithm for efficient representation of possible deviations from theXML schema.

National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-4118 (URN)10.1145/2665068 (DOI)000345067300004 ()2-s2.0-84910151277 (Scopus ID)1ff1e892-cff5-4666-8c56-cfeebf71d446 (Local ID)1ff1e892-cff5-4666-8c56-cfeebf71d446 (Archive number)1ff1e892-cff5-4666-8c56-cfeebf71d446 (OAI)
Projects
Architecture for Service-Oriented Process – Monitoring and Control, Embeddable EXI implementation in C
Note
Validerad; 2014; 20140328 (rumkyu)Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2018-07-10Bibliographically approved
Delsing, J., Eliasson, J., Kyusakov, R., Punal, P., Mäkitaavola, H. & Larsmark, M. (2014). Project: Arrowhead. Paper presented at .
Open this publication in new window or tab >>Project: Arrowhead
Show others...
2014 (English)Other (Other (popular science, discussion, etc.))
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering Embedded Systems
Research subject
Industrial Electronics; Embedded System
Identifiers
urn:nbn:se:ltu:diva-36022 (URN)2c7039c5-b106-436a-b066-cece1ba34aa7 (Local ID)2c7039c5-b106-436a-b066-cece1ba34aa7 (Archive number)2c7039c5-b106-436a-b066-cece1ba34aa7 (OAI)
Note

Publikationer: A Distributed Framework for Supporting 3D Swarming Applications; Energy harvesting technologies for wireless sensors in rotating environments; Efficient Web Services for End-To-End Interoperability of Embedded Systems; A Feasibility Study of SOA-enabled Networked Rock Bolts; The Arrowhead Approach for SOA Application Development and Documentation; Towards Industrial Internet of Things: An Efficient and Interoperable Communication Framework; An Authentication and Access Control Framework for CoAP-based Internet of Things; Plant descriptions for engineering tool interoperability; IoT Interoperability - On-demand and low latency Transparent Multi-protocol Translato; Status: Pågående; Period: 01/01/2013 → …

Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2017-11-25Bibliographically approved
Punal, P., Eliasson, J., Kyusakov, R., Delsing, J., Raayatinezhad, A. & Johansson, M. (2013). Enabling cloud-connectivity for mobile internet of things applications (ed.). In: (Ed.), (Ed.), Proceedings: 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. Paper presented at IEEE International Symposium on Service-Oriented System Engineering : 25/03/2013 - 28/03/2013 (pp. 518-526). Piscataway, NJ: IEEE Communications Society
Open this publication in new window or tab >>Enabling cloud-connectivity for mobile internet of things applications
Show others...
2013 (English)In: Proceedings: 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013, Piscataway, NJ: IEEE Communications Society, 2013, p. 518-526Conference paper, Published paper (Refereed)
Abstract [en]

The number of small embedded devices connected to the Internet is increasing. This growth is mostly due to the large number of Internet of Things (IoT) deployments, withapplications such as: industrial monitoring, home automation, and others. One common aspect with the majority of application areas is the lack of mobility. Most IoT devices arestationary and often use IEEE 802.15.4/6LoWPAN solutions. When a high level of mobility is required, the use of IEEE 802.15.4 is not possible without adding additional hardware for the user to carry.In this article, a holistic network architecture consisting of heterogeneous devices is presented. The architecture is composed of Embedded Internet Systems (EIS) and uses standard communication protocols. One important feature is the use of the Service-oriented architecture (SOA) paradigm. The use of SOA, by utilization of the CoAP protocol and standard services, enables the proposed architecture to exchange sensor-and actuator data with an Internet-based cloud as well as a user’s local cloud consisting of sensor IoT devices, smart phones and laptops. Another component of the architecture is a web-based human-machine interface for configuration, monitoring and visualization of sensor and actuator data using emerging web technologies for structured data processing.Results from experiments and real-world tests show that the proposed architecture can support sample rates of up to several kHz while enabling sensor data to be transmitted to SOA services in real time. This proves that the use of SOA, and RESTful web services in particular, is feasible on resource-constrained platforms while supporting true mobility.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2013
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-34211 (URN)10.1109/SOSE.2013.33 (DOI)000325717400068 ()2-s2.0-84880901930 (Scopus ID)858477f6-d7a7-4a81-a8ba-5ac0eae9ef22 (Local ID)978-1-4673-5659-6 (ISBN)858477f6-d7a7-4a81-a8ba-5ac0eae9ef22 (Archive number)858477f6-d7a7-4a81-a8ba-5ac0eae9ef22 (OAI)
Conference
IEEE International Symposium on Service-Oriented System Engineering : 25/03/2013 - 28/03/2013
Projects
Architecture for Service-Oriented Process – Monitoring and Control, CASTT - Centre for Automotive Systems Technologies and Testing
Note
Godkänd; 2013; 20130412 (pabpun)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Organisations

Search in DiVA

Show all publications