References of "Engel, Thomas 50001752"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailLuxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research
Codeca, Lara UL; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of the 7th IEEE Vehicular Networking Conference (2015, December)

Different research communities varying from telecommunication to traffic engineering are working on problems related to vehicular traffic congestion, intelligent transportation systems, and mobility ... [more ▼]

Different research communities varying from telecommunication to traffic engineering are working on problems related to vehicular traffic congestion, intelligent transportation systems, and mobility patterns using information collected from a variety of sensors. To test the solutions, the first step is to use a vehicular traffic simulator with an appropriate scenario in order to reproduce realistic mobility patterns. Many mobility simulators are available, and the choice is usually done based on the size and type of simulation required, but a common problem is to find a realistic traffic scenario. In order to evaluate and compare new communication protocols for vehicular networks, it is necessary to use a wireless network simulator in combination with a vehicular traffic simulator. This additional step introduces further requirements for the scenario. The aim of this work is to provide a scenario able to meet all the common requirements in terms of size, realism and duration, in order to have a common basis for the evaluations. In the interest of building a realistic scenario, we decided to start from a real city with a standard topology common in mid-size European cities, and real information concerning traffic demands and mobility patterns. In this paper we show the process used to build the Luxembourg SUMO Traffic (LuST) Scenario, and present a summary of its characteristics together with an overview of its possible use cases. [less ▲]

Detailed reference viewed: 581 (68 UL)
Full Text
Peer Reviewed
See detailA Car Hacking Experiment: When Connectivity meets Vulnerability
Jafarnejad, Sasan UL; Codeca, Lara UL; Bronzi, Walter UL et al

in Globecom Workshops (GC Wkshps), 2015 IEEE (2015, December)

Interconnected vehicles are a growing commodity providing remote access to on-board systems for monitoring and controlling the state of the vehicle. Such features are built to facilitate and strengthen ... [more ▼]

Interconnected vehicles are a growing commodity providing remote access to on-board systems for monitoring and controlling the state of the vehicle. Such features are built to facilitate and strengthen the owner’s knowledge about its car but at the same time they impact its safety and security. Vehicles are not ready to be fully connected as various attacks are currently possible against their control systems. In this paper, we analyse possible attack scenarios on a recently released all-electric car and investigate their impact on real life driving scenarios. We leverage our findings to change the behaviour of safety critical components of the vehicle in order to achieve autonomous driving using an Open Vehicle Monitoring System. Furthermore, to demonstrate the potential of our setup, we developed a novel mobile application able to control such vehicle systems remotely through the Internet. We challenge the current state-of-the-art technology in today’s vehicles and provide a vulnerability analysis on modern embedded systems. [less ▲]

Detailed reference viewed: 406 (40 UL)
Peer Reviewed
See detailValidation study of risky event classification using driving pattern factors
Castignani, German UL; Derrmann, Thierry UL; Frank, Raphaël UL et al

Scientific Conference (2015, November 24)

Detailed reference viewed: 195 (6 UL)
Full Text
Peer Reviewed
See detailSWIPE: Monitoring Human Dynamics using Smart Devices
Faye, Sébastien UL; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of the 7th International Conference on Mobile Computing, Applications and Services (MobiCASE '15) (2015, November)

SWIPE is a platform for sensing, recording and processing human dynamics using smart devices. The idea behind this type of system, which exists for the most part on smartphones, is to consider new metrics ... [more ▼]

SWIPE is a platform for sensing, recording and processing human dynamics using smart devices. The idea behind this type of system, which exists for the most part on smartphones, is to consider new metrics from wearables - in our case smartwatches. These new devices, used in parallel with traditional smartphones, provide clear indicators of the activities and movements performed by the users who wear them. They can also sense environmental data and interactions. The SWIPE architecture is structured around two main elements, namely (1) an Android application deployed directly on the devices, allowing them to synchronize and collect data; and (2) a server for storing and processing the data. This publication is intended to communicate on the platform with both the scientific and the industry communities. SWIPE is freely distributed under a MIT license. [less ▲]

Detailed reference viewed: 193 (4 UL)
Full Text
Peer Reviewed
See detailAdaptive Activity and Context Recognition using Multimodal Sensors in Smart Devices
Faye, Sébastien UL; Frank, Raphaël UL; Engel, Thomas UL

in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Mobile Computing, Applications, and Services (2015, November)

The continuous development of new technologies has led to the creation of a wide range of personal devices embedded with an ever increasing number of miniature sensors. With accelerometers and ... [more ▼]

The continuous development of new technologies has led to the creation of a wide range of personal devices embedded with an ever increasing number of miniature sensors. With accelerometers and technologies such as Bluetooth and Wi-Fi, today's smartphones have the potential to monitor and record a complete history of their owners' movements as well as the context in which they occur. In this article, we focus on four complementary aspects related to the understanding of human behaviour. First, the use of smartwatches in combination with smartphones in order to detect different activities and associated physiological patterns. Next, the use of a scalable and energy-efficient data structure that can represent the detected signal shapes. Then, the use of a supervised classifier (i.e. Support Vector Machine) in parallel with a quantitative survey involving a dozen participants to achieve a deeper understanding of the influence of each collected metric and its use in detecting user activities and contexts. Finally, the use of novel representations to visualize the activities and social interactions of all the users, allowing the creation of quick and easy-to-understand comparisons. The tools used in this article are freely available online under a MIT licence. [less ▲]

Detailed reference viewed: 404 (16 UL)
Full Text
Peer Reviewed
See detailChanging Mobility Behaviour through Recommendations
McCall, Rod; Koenig, Vincent UL; Martin, Romain UL et al

in Proceedings of the ACM Recsys CrowdRec Workshop 2015 (2015, September 19)

In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified ... [more ▼]

In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified mobile application Commutastic that offers users incentives to undertake after work activities. With Commutastic we try to persuade users to change their commuting time so as to avoid the evening peak. Furthermore we investigate the behaviour change with focus groups and questionnaires. The preliminary data indicates that behaviour change is possible and that traffic reduction can happen on a bigger scale. [less ▲]

Detailed reference viewed: 57 (1 UL)
Full Text
Peer Reviewed
See detailA study on ethical aspects and legal issues in e-learning
Östlund, Stefanie UL; Panchenko, Andriy UL; Engel, Thomas UL

in Proceedings of the 8th International Conference on E-Learning (e-Learning'15) (2015, September)

Detailed reference viewed: 263 (21 UL)
Full Text
Peer Reviewed
See detailA Formalization of Fingerprinting Techniques
Lanze, Fabian UL; Panchenko, Andriy UL; Engel, Thomas UL

in Proceedings of the IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015 (2015, August)

Detailed reference viewed: 235 (14 UL)
Full Text
Peer Reviewed
See detailText entry on smart glasses A comparison of two input techniques
Mccall, Roderick UL; Popleteev, Andrei UL; Martin, Benoit et al

in 8th International Conference on Human System Interaction (HSI'2015) (2015, June)

This paper presents a comparative pilot usability study of Dasher and an on-screen keyboard on a head-mounted display. Interaction logging data was captured along with subjective responses (via the SUS ... [more ▼]

This paper presents a comparative pilot usability study of Dasher and an on-screen keyboard on a head-mounted display. Interaction logging data was captured along with subjective responses (via the SUS questionnaire). The results indicate that there is a strong need to develop text entry systems for smart glasses rather to simply adopt those that are already available. However, both approaches are useful when there is a need to enter private or sensitive data. [less ▲]

Detailed reference viewed: 318 (7 UL)
Full Text
See detailLuST: a 24-hour Scenario of Luxembourg City for SUMO Traffic simulations
Codeca, Lara UL; Frank, Raphaël UL; Engel, Thomas UL

Presentation (2015, May 07)

Various vehicular communities ranging from telecommunication to infrastructure are working on problems related to traffic congestion, intelligent transportation systems, and mobility patterns using ... [more ▼]

Various vehicular communities ranging from telecommunication to infrastructure are working on problems related to traffic congestion, intelligent transportation systems, and mobility patterns using information collected from a variety of sensors. In order to test the solutions, the first step is to use a vehicular traffic simulator and an appropriate scenario. Many mobility simulators are available, but a common problem is finding a realistic traffic scenario. The aim of this work is to provide a scenario able to meet all the common requirements in terms of size, realism and duration, in order to have a common basis for the evaluations. In the interest of building a realistic scenario, we decided to start from a real city with a standard topology common in mid-size European cities, and real information concerning traffic demands and mobility patterns. In this paper we show the process used to build the Luxembourg SUMO Traffic (LuST) Scenario, and present a summary of its characteristics together with an overview of its possible uses. [less ▲]

Detailed reference viewed: 395 (14 UL)
Full Text
Peer Reviewed
See detailNetwork troubleshooting with SDN-RADAR (demo paper)
Avanesov, Tigran; Gheorghe, Gabriela UL; Palattella, Maria Rita UL et al

in Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015, May)

Detailed reference viewed: 151 (7 UL)
Full Text
Peer Reviewed
See detailDetection of Population Mobility Anomalies in Senegal from Base Station Profiles
Melakessou, Foued UL; Derrmann, Thierry UL; Frank, Raphaël UL et al

Scientific Conference (2015, April 08)

The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order ... [more ▼]

The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order to extract realistic human mobility models adapted to the Senegal use case. In this paper, we describe our analysis of the available D4D datasets. The first contribution is the modeling of the daily traffic demand profile of each antenna, by considering voice and short message services. The evaluation of mobility models will help to better design and develop future infrastructures in order to better support the actual demand. A classification has been performed into urban, suburban and rural modes. An algorithm has been developed to detect traffic anomalies in 2013, based on the daily profiles. The second contribution corresponds to the generation of inter-antennas and inter-arrondissements mobility graphs for each month of 2013. [less ▲]

Detailed reference viewed: 138 (5 UL)
Peer Reviewed
See detailA Cell Dwell Time Model for Synthetic Population Generation from Call Detail Records
Derrmann, Thierry UL; Frank, Raphaël UL; Melakessou, Foued UL et al

Scientific Conference (2015, April 08)

In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and ... [more ▼]

In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and individual parameters obtained via the analysis of the Data For Development (D4D) Call Detail Records (CDR). We rely on the shortest path road network to interconnect two distant cell sites. The resulting dwell time model can be used to compute accurate user trajectories even with partial information. This work represents a first step towards the generation of a synthetic population that can be used to perform a wide range of simulative studies to evaluate and optimize transportation networks. [less ▲]

Detailed reference viewed: 217 (33 UL)
Full Text
Peer Reviewed
See detailSDN-RADAR: Network troubleshooting combining user experience and SDN capabilities
Gheorghe, Gabriela UL; Avanesov, Tigran; Palattella, Maria Rita UL et al

in Proc. of IEEE Conf. on Network Softwarization (NetSoft) (2015, April)

Detailed reference viewed: 215 (11 UL)
Full Text
Peer Reviewed
See detailEnabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers
Mouton, Maximilien; Castignani, German; Frank, Raphaël UL et al

in Vehicular Communications (2015), 2(2), 59-69

Detailed reference viewed: 127 (2 UL)
Full Text
Peer Reviewed
See detailDriver Behavior Profiling Using Smartphones: A Low-Cost Platform for Driver Monitoring
Castignani, German UL; Derrmann, Thierry UL; Frank, Raphaël UL et al

in Intelligent Transportation Systems Magazine, IEEE (2015), 7(1), 91-102

Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In ... [more ▼]

Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In particular, over the last few years there has been an increasing interest in monitoring vehicles and driving data, aiming to identify risky driving maneuvers and to improve driver efficiency. Such a driver profiling system can be useful in fleet management, insurance premium adjustment, fuel consumption optimization or CO2 emission reduction. In this paper, we analyze how smartphone sensors can be used to identify driving maneuvers and propose SenseFleet, a driver profile platform that is able to detect risky driving events independently from the mobile device and vehicle. A fuzzy system is used to compute a score for the different drivers using real-time context information like route topology or weather conditions. To validate our platform, we present an evaluation study considering multiple drivers along a predefined path. The results show that our platform is able to accurately detect risky driving events and provide a representative score for each individual driver. [less ▲]

Detailed reference viewed: 567 (47 UL)
Full Text
Peer Reviewed
See detail6TiSCH Centralized Scheduling: when SDN Meet IoT
Thubert, Pascal; Palattella, Maria Rita UL; Engel, Thomas UL

in Proc. of IEEE Conf. on Standards for Communications & Networking (CSCN’15) (2015)

Detailed reference viewed: 265 (5 UL)
Full Text
Peer Reviewed
See detailHacker’s Toolbox: Detecting Software-Based 802.11 Evil Twin Access Points
Lanze, Fabian UL; Panchenko, Andriy UL; Ponce-Alcaide, Ignacio et al

in Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015) (2015)

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are ... [more ▼]

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are exposed to a severe security threat: since 802.11 identifiers (SSID, BSSID) can be easily faked, an attacker can setup an evil twin, i.e., an access point (AP) that users are unable to distinguish from a legitimate one. Once a user connects to the evil twin, he inadvertently creates a playground for various attacks such as collection of sensitive data (e.g., credit card information, passwords) or man-in-the-middle attacks even on encrypted traffic. It is particularly alarming that this security flaw has led to the development of several tools that are freely available, easy to use and allow mounting the attack from commodity client devices such as laptops, smartphones or tablets without attracting attention. In this paper we provide a detailed overview of tools that have been developed (or can be misused) to set up evil twin APs. We inspect them thoroughly in order to identify characteristics that allow them to be distinguished from legitimate hardware-based access points. Our analysis has discovered three methods for detecting software-based APs. These exploit accuracy flaws due to emulation of hardware behavior or peculiarities of the client Wi-Fi hardware they operate on. Our evaluation with 60 hardware APs and a variety of tools on different platforms reveals enormous potential for reliable detection. Furthermore, our methods can be performed on typical client hardware within a short period of time without even connecting to a potentially untrustworthy access point. [less ▲]

Detailed reference viewed: 283 (4 UL)
Full Text
Peer Reviewed
See detailOn-the-Fly Bandwidth Reservation for 6TiSCH Wireless Industrial Networks
Palattella, Maria Rita UL; Watteyne, Thomas; Wang, Qin et al

in IEEE Sensors Journal (2015)

Detailed reference viewed: 186 (12 UL)