Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
Link to record
Permanent link

Direct link
Rohner, Christian, ProfessorORCID iD iconorcid.org/0000-0002-1527-734X
Publications (10 of 115) Show all publications
Piumwardane, D., Padmal, M., Rohner, C. & Voigt, T. (2025). Desynchronized Querying of Analog Backscatter Tags. In: : . Paper presented at 2025 21st International Conference on Distributed Computing in Sensor Systems (DCOSS-IoT), Tuscany, Italy, 9-11 June, 2025. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Desynchronized Querying of Analog Backscatter Tags
2025 (English)Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Analog Backscatter Communication, Multi-tag Networks, Tag Querying, Sensing
National Category
Computer Sciences Communication Systems
Research subject
Electrical Engineering with Specialisation in Networked Embedded Systems
Identifiers
urn:nbn:se:uu:diva-555902 (URN)
Conference
2025 21st International Conference on Distributed Computing in Sensor Systems (DCOSS-IoT), Tuscany, Italy, 9-11 June, 2025
Funder
Swedish Research Council, 2018-05480Swedish Research Council, 2021-04968Swedish Research Council, 2024-05758Vinnova
Note

Authors in the list of papers of Dilushi Piumwardane's thesis: Dilushi Piumwardane, Madhushanka Padmal, Carlos Perez-Penichet, Christian Rohner, Thiemo Voigt

Available from: 2025-05-06 Created: 2025-05-06 Last updated: 2025-05-07
Shen, X., Magnani, M., Rohner, C. & Skerman, F. (2025). On the accurate computation of expected modularity in probabilistic networks. Scientific Reports, 15(1), Article ID 19062.
Open this publication in new window or tab >>On the accurate computation of expected modularity in probabilistic networks
2025 (English)In: Scientific Reports, E-ISSN 2045-2322, Vol. 15, no 1, article id 19062Article in journal (Refereed) Published
Abstract [en]

Modularity is one of the most widely used measures for evaluating communities in networks. In probabilistic networks, where the existence of edges is uncertain and uncertainty is represented by probabilities, the expected value of modularity can be used instead. However, efficiently computing expected modularity is challenging. To address this challenge, we propose a novel and efficient technique (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textrm{FPWP}$$\end{document}) for computing the probability distribution of modularity and its expected value. In this paper, we implement and compare our method and various general approaches for expected modularity computation in probabilistic networks. These include: (1) translating probabilistic networks into deterministic ones by removing low-probability edges or treating probabilities as weights, (2) using Monte Carlo sampling to approximate expected modularity, and (3) brute-force computation. We evaluate the accuracy and time efficiency of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textrm{FPWP}$$\end{document} through comprehensive experiments on both real-world and synthetic networks with diverse characteristics. Our results demonstrate that removing low-probability edges or treating probabilities as weights produces inaccurate results, while the convergence of the sampling method varies with the parameters of the network. Brute-force computation, though accurate, is prohibitively slow. In contrast, our method is much faster than brute-force computation, but guarantees an accurate result.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Modularity calculation, Probabilistic networks, Algorithms
National Category
Subatomic Physics
Identifiers
urn:nbn:se:uu:diva-559313 (URN)10.1038/s41598-025-99114-5 (DOI)001499638000026 ()40447791 (PubMedID)2-s2.0-105006928591 (Scopus ID)
Available from: 2025-06-17 Created: 2025-06-17 Last updated: 2025-06-17Bibliographically approved
Padmal, M., Piumwardane, D., Rohner, C. & Voigt, T. (2024). Channel Estimation for Analog Backscatter Tags. In: RFCom '24: Proceedings of the First International Workshop on Radio Frequency (RF) Computing. Paper presented at 1st ACM International Workshop on Radio Frequency (RF) Computing (RFCom), November 4, 2024, Hangzhou, China (pp. 1-7). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Channel Estimation for Analog Backscatter Tags
2024 (English)In: RFCom '24: Proceedings of the First International Workshop on Radio Frequency (RF) Computing, Association for Computing Machinery (ACM), 2024, p. 1-7Conference paper, Published paper (Refereed)
Abstract [en]

Analog backscatter communication is a promising technology for low-power and low-cost communication. The simplicity of the analog backscatter tags make it possible to achieve low-power operation. However, they are limited to perform only simple operations and do not have the capability to perform complex tasks such as estimating the channel parameters. In this work, we propose a novel method to measure the received signal strength at the analog backscatter tag. We achieve this by converting the incident signal strength at the tag, to a frequency to eliminate signal amplitude modifications in the path from the tag to the backscatter receiver. We further enhance the granularity of the signal strength measurement using harmonics that are inherently generated by the backscatter signal. Through experiments, we show that frequency modulation combined with the harmonic spread is a good and a robust indicator of the gain of the carrier-to-tag channel. Our experimental results show a mean error of 1.8% in estimating the received signal power at the tag using backscatter harmonic frequency data.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Keywords
Analog backscatter, Channel estimation, Harmonics, RF sensing, Wireless sensor networks
National Category
Communication Systems Signal Processing
Identifiers
urn:nbn:se:uu:diva-545677 (URN)10.1145/3698386.3699989 (DOI)001351427600001 ()979-8-4007-1298-2 (ISBN)
Conference
1st ACM International Workshop on Radio Frequency (RF) Computing (RFCom), November 4, 2024, Hangzhou, China
Funder
Swedish Research Council, 2018-05480Swedish Research Council, 2021-04968Swedish Foundation for Strategic Research
Available from: 2024-12-20 Created: 2024-12-20 Last updated: 2024-12-20Bibliographically approved
Kaveh, A., Rohner, C. & Johnsson, A. (2024). Impact of Attack Variations and Topology on IoT Intrusion Detection Model Generalizability. In: 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS): . Paper presented at 21st IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Sep 23-25, 2024, Seoul, South Korea (pp. 364-370). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Impact of Attack Variations and Topology on IoT Intrusion Detection Model Generalizability
2024 (English)In: 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 364-370Conference paper, Published paper (Refereed)
Abstract [en]

Intrusion Detection Systems (IDS) play a critical role in safeguarding IoT networks, especially in sectors like healthcare, manufacturing, and smart cities where safety is paramount. Machine learning (ML) holds significant promise for training IDS models, leveraging data from past attacks. However, the effectiveness of these models are dependent on the quality and diversity of training data, which is often limited from the perspective of a single network operator.

This paper delves into the challenges of ML-based IDS model generalization across IoT network scenarios with expected distributional shifts in the data. We examine variations in known attack patterns and changes in IoT network configurations, quantifying their impact on model generalizability. These shifts originates from when multiple network operators seek to share knowledge to enhance their respective IDS capabilities, when a new attack variation is launched, or when an operator reconfigure its network. We explore two approaches to address these challenges: namely data sharing and horizontal federated learning for privacy preservation. While data sharing proves effective across scenarios, it relies on mutual trust among network operators. In contrast, federated learning preserves privacy but is less effective, especially when the network topology is the primary driver of distributional shifts in the train and test data.

To facilitate our study, we implemented Blackhole attack variation strategies within the Cooja network simulator. Our objective was to generate a large dataset enabling comprehensive analysis of attack variations across diverse set of network configurations to study the impact on ML-based IDS for IoT networks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE International Conference on Mobile Ad-hoc and Sensor Systems, ISSN 2155-6806, E-ISSN 2155-6814 ; 21
Keywords
Internet of Things, Blackhole Attacks, Intrusion Detection Systems, Machine Learning, Federated Learning
National Category
Computer Sciences Computer Systems Computer Engineering
Identifiers
urn:nbn:se:uu:diva-544681 (URN)10.1109/MASS62177.2024.00055 (DOI)001348978800043 ()2-s2.0-85210264781 (Scopus ID)979-8-3503-6399-9 (ISBN)979-8-3503-6400-2 (ISBN)
Conference
21st IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Sep 23-25, 2024, Seoul, South Korea
Funder
Vinnova, 2021-02423Vinnova, 2023-02982Swedish Civil Contingencies Agency
Available from: 2024-12-10 Created: 2024-12-10 Last updated: 2024-12-10Bibliographically approved
Mages, T., Anastasiadi, E. & Rohner, C. (2024). Non-Negative Decomposition of Multivariate Information: From Minimum to Blackwell-Specific Information. Entropy, 26(5), Article ID 424.
Open this publication in new window or tab >>Non-Negative Decomposition of Multivariate Information: From Minimum to Blackwell-Specific Information
2024 (English)In: Entropy, E-ISSN 1099-4300, Vol. 26, no 5, article id 424Article in journal (Refereed) Published
Abstract [en]

Partial information decompositions (PIDs) aim to categorize how a set of source variables provides information about a target variable redundantly, uniquely, or synergetically. The original proposal for such an analysis used a lattice-based approach and gained significant attention. However, finding a suitable underlying decomposition measure is still an open research question at an arbitrary number of discrete random variables. This work proposes a solution with a non-negative PID that satisfies an inclusion-exclusion relation for any f-information measure. The decomposition is constructed from a pointwise perspective of the target variable to take advantage of the equivalence between the Blackwell and zonogon order in this setting. Zonogons are the Neyman-Pearson region for an indicator variable of each target state, and f-information is the expected value of quantifying its boundary. We prove that the proposed decomposition satisfies the desired axioms and guarantees non-negative partial information results. Moreover, we demonstrate how the obtained decomposition can be transformed between different decomposition lattices and that it directly provides a non-negative decomposition of R & eacute;nyi-information at a transformed inclusion-exclusion relation. Finally, we highlight that the decomposition behaves differently depending on the information measure used and how it can be used for tracing partial information flows through Markov chains.

Place, publisher, year, edition, pages
MDPI, 2024
Keywords
partial information decomposition, redundancy, synergy, information flow analysis, f-information, R & eacute, nyi-information
National Category
Information Studies
Identifiers
urn:nbn:se:uu:diva-531089 (URN)10.3390/e26050424 (DOI)001232879400001 ()38785673 (PubMedID)
Available from: 2024-06-13 Created: 2024-06-13 Last updated: 2024-06-13Bibliographically approved
Mages, T. & Rohner, C. (2024). Quantifying redundancies and synergies with measures of inequality. PLOS ONE, 19(11), Article ID e0313281.
Open this publication in new window or tab >>Quantifying redundancies and synergies with measures of inequality
2024 (English)In: PLOS ONE, E-ISSN 1932-6203, Vol. 19, no 11, article id e0313281Article in journal (Refereed) Published
Abstract [en]

Inequality measures provide a valuable tool for the analysis, comparison, and optimization based on system models. This work studies the relation between attributes or features of an individual to understand how redundant, unique, and synergetic interactions between attributes construct inequality. For this purpose, we define a family of inequality measures (f-inequality) from f-divergences. Special cases of this family are, among others, the Pietra index and the Generalized Entropy index. We present a decomposition for any f-inequality with intuitive set-theoretic behavior that enables studying the dynamics between attributes. Moreover, we use the Atkinson index as an example to demonstrate how the decomposition can be transformed to measures beyond f-inequality. The presented decomposition provides practical insights for system analyses and complements subgroup decompositions. Additionally, the results present an interesting interpretation of Shapley values and demonstrate the close relation between decomposing measures of inequality and information.

Place, publisher, year, edition, pages
Public Library of Science (PLoS), 2024
National Category
Computer Systems Sociology Economics
Research subject
Applied Mathematics and Statistics
Identifiers
urn:nbn:se:uu:diva-543577 (URN)10.1371/journal.pone.0313281 (DOI)001360845400021 ()39565765 (PubMedID)2-s2.0-85209695452 (Scopus ID)
Projects
Resilient Internet of Things (RIOT)
Funder
Swedish Civil Contingencies Agency, MSB 2018-12526
Available from: 2024-11-21 Created: 2024-11-21 Last updated: 2024-12-12Bibliographically approved
Engstrand, J., Krentz, K.-F., Asan, N. B., Padmal, M., Yan, W., Joseph, L., . . . Voigt, T. (2024). Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack. In: Tschorsch, F; Thilakarathna, K; Solmaz, G (Ed.), Proceedings of the 49th IEEE Conference on Local Computer Networks: . Paper presented at 49th IEEE Conference on Local Computer Networks (LCN), Normandie, FRANCE, 8-10 Oct. 2024 (pp. 1-9). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack
Show others...
2024 (English)In: Proceedings of the 49th IEEE Conference on Local Computer Networks / [ed] Tschorsch, F; Thilakarathna, K; Solmaz, G, Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 1-9Conference paper, Published paper (Refereed)
Abstract [en]

Innovative medical applications based on networked implants foster the development of in-body communication technologies. Among the in-body communication technologies that are being considered, fat intra-body communication (Fat-IBC) is a very recent approach. Its main advantage lies in its higher data rate compared to earlier approaches based on capacitive and galvanic coupling. However, Fat-IBC faces privacy-, security-, as well as safety-related attacks. In this paper, we discuss security and privacy concerns about Fat-IBC, as well as corresponding countermeasures. Furthermore, we present our secure protocol stack for Fat-IBC and suggest directions for future research.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
Conference on Local Computer Networks, ISSN 2831-7742, E-ISSN 0742-1303
National Category
Communication Systems
Identifiers
urn:nbn:se:uu:diva-540830 (URN)10.1109/lcn60385.2024.10639677 (DOI)001433480800029 ()2-s2.0-85214941362 (Scopus ID)979-8-3503-8800-8 (ISBN)979-8-3503-8801-5 (ISBN)
Conference
49th IEEE Conference on Local Computer Networks (LCN), Normandie, FRANCE, 8-10 Oct. 2024
Available from: 2024-10-21 Created: 2024-10-21 Last updated: 2025-03-28Bibliographically approved
Piumwardane, D., Padmal, M., Ranganathan, V., Hewage, K., Rohner, C. & Voigt, T. (2024). Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter. In: 2024 IEEE International Conference on RFID (RFID): . Paper presented at International Conference on RFID (RFID), Cambridge, MA, June 04-06, 2024 (pp. 1-6). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter
Show others...
2024 (English)In: 2024 IEEE International Conference on RFID (RFID), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 1-6Conference paper, Published paper (Refereed)
Abstract [en]

Analog backscatter enables sensing and communication while consuming significantly lower power than digital backscatter. An analog backscatter tag maps sensor readings directly to backscatter transmissions avoiding power hungry blocks such as ADCs. The sensor value variations are backscattered atop a carrier as changes in frequency and amplitude. Frequency variations are commonly used in backscatter, to avoid the strong self-interference from the carrier. The range of the sensor output linearly maps to the range of base-band frequency variation. Hence a sensor with a wider output range requires a larger base-band frequency range to encode sensor data. This increases the tag oscillator's switching frequency and hence the tag's power consumption. We propose to use higher order harmonic frequencies which allows us to reduce the tag switching frequency and read sensor data even when the carrier masks the fundamental frequency. Our system design lowers the cost and power consumption of the analog backscatter system making it suitable for mobile-based sensing applications. We present experimental results demonstrating the viability of our approach and implement a complete system that includes a lowcost radio receiver. Using a carrier with 0 dBm power, we detect the 15th harmonic up to three meters resulting in 15 times more frequency resolution than the fundamental while reducing the tag oscillator's power consumption by more than 43%. The 7th harmonic is visible up to 18 meters. Increasing the carrier power enables the detection of additional harmonic frequencies.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE International Conference on RFID, E-ISSN 2374-0221
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering Communication Systems
Research subject
Electrical Engineering with Specialisation in Networked Embedded Systems
Identifiers
urn:nbn:se:uu:diva-526164 (URN)10.1109/RFID62091.2024.10582681 (DOI)001275101700017 ()2-s2.0-85199886254 (Scopus ID)979-8-3503-7359-2 (ISBN)979-8-3503-7360-8 (ISBN)
Conference
International Conference on RFID (RFID), Cambridge, MA, June 04-06, 2024
Funder
Swedish Research Council, 2018-05480Swedish Research Council, 2021-04968
Available from: 2024-04-05 Created: 2024-04-05 Last updated: 2025-01-24Bibliographically approved
N. Sathi, V., Rohner, C. & Voigt, T. (2023). A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices. In: ICC 2023 - IEEE International Conference on Communications: . Paper presented at ICC 2023, IEEE International Conference on Communications, 28 May-1 June, 2023, Rome, Italy (pp. 615-621). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices
2023 (English)In: ICC 2023 - IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE), 2023, p. 615-621Conference paper, Published paper (Refereed)
Abstract [en]

Microwave communication through the fat tissue in the human body enables a new channel for wearable devices to communicate with each other. The wearable devices can communicate to the external world through a powerful device in their network called central control unit (CU); for example, a smartphone. Some wearable devices may be out of the range of the CU temporarily due to body movements or permanently due to low signal strength, in a fat channel communication network. Such devices can connect to the CU with the help of their neighbor device in the same network. In this paper, we propose a protocol to ensure secure indirect authentication and key establishment between the out-of-range device and the CU in a fat channel communication network, via an untrusted intermediate device in the network. The proposed protocol is lightweight and resistant to denial-of-sleep attacks on the intermediate device. We analyze the security and the computation overhead of the proposed protocol.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Series
IEEE International Conference on Communications, ISSN 1550-3607, E-ISSN 1938-1883
National Category
Computer Systems
Identifiers
urn:nbn:se:uu:diva-510114 (URN)10.1109/ICC45041.2023.10278883 (DOI)001094862600099 ()978-1-5386-7462-8 (ISBN)978-1-5386-7463-5 (ISBN)
Conference
ICC 2023, IEEE International Conference on Communications, 28 May-1 June, 2023, Rome, Italy
Funder
Swedish Foundation for Strategic Research
Available from: 2023-08-24 Created: 2023-08-24 Last updated: 2024-03-13Bibliographically approved
Borgström, G., Rohner, C. & Black-Schaffer, D. (2023). Faster FunctionalWarming with Cache Merging. In: PROCEEDINGS OF SYSTEM ENGINEERING FOR CONSTRAINED EMBEDDED SYSTEMS, DRONESE AND RAPIDO 2023: . Paper presented at Conference on Drone Systems Engineering (DroneSE) / Conference on Rapid Simulation and Performance Evaluation - Methods and Tools (RAPIDO) / Workshop on System Engineering for Constrained Embedded Systems / HiPEAC Conference, JAN 16-18, 2023, Toulouse, FRANCE (pp. 39-47). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Faster FunctionalWarming with Cache Merging
2023 (English)In: PROCEEDINGS OF SYSTEM ENGINEERING FOR CONSTRAINED EMBEDDED SYSTEMS, DRONESE AND RAPIDO 2023, Association for Computing Machinery (ACM), 2023, p. 39-47Conference paper, Published paper (Refereed)
Abstract [en]

Smarts-like sampled hardware simulation techniques achieve good accuracy by simulating many small portions of an application in detail. However, while this reduces the simulation time, it results in extensive cache warming times, as each of the many simulation points requires warming the whole memory hierarchy. Adaptive Cache Warming reduces this time by iteratively increasing warming to achieve sufficient accuracy. Unfortunately, each increases requires that the previous warming be redone, nearly doubling the total warming. We address re-warming by developing a technique to merge the cache states from the previous and additional warming iterations. We demonstrate our merging approach on multi-level LRU cache hierarchy and evaluate and address the introduced errors. Our experiments show that Cache Merging delivers an average speedup of 1.44x, 1.84x, and 1.87x for 128kB, 2MB, and 8MB L2 caches, respectively, (vs. a 2x theoretical maximum speedup) with 95-percentile absolute IPC errors of only 0.029, 0.015, and 0.006, respectively. These results demonstrate that Cache Merging yields significantly higher simulation speed with minimal losses.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2023
Keywords
functional warming, cache warming, cache merging
National Category
Computer Sciences Computer Engineering
Identifiers
urn:nbn:se:uu:diva-519733 (URN)10.1145/3579170.3579256 (DOI)001106628800005 ()979-8-4007-0045-3 (ISBN)
Conference
Conference on Drone Systems Engineering (DroneSE) / Conference on Rapid Simulation and Performance Evaluation - Methods and Tools (RAPIDO) / Workshop on System Engineering for Constrained Embedded Systems / HiPEAC Conference, JAN 16-18, 2023, Toulouse, FRANCE
Available from: 2024-01-09 Created: 2024-01-09 Last updated: 2024-01-09Bibliographically approved
Projects
Batterifria IoT nätverk [2018-05480_VR]; Uppsala University; Publications
Piumwardane, D., Padmal, M., Rohner, C. & Voigt, T. (2025). Desynchronized Querying of Analog Backscatter Tags. In: : . Paper presented at 2025 21st International Conference on Distributed Computing in Sensor Systems (DCOSS-IoT), Tuscany, Italy, 9-11 June, 2025. Institute of Electrical and Electronics Engineers (IEEE)Padmal, M., Piumwardane, D., Rohner, C. & Voigt, T. (2024). Channel Estimation for Analog Backscatter Tags. In: RFCom '24: Proceedings of the First International Workshop on Radio Frequency (RF) Computing. Paper presented at 1st ACM International Workshop on Radio Frequency (RF) Computing (RFCom), November 4, 2024, Hangzhou, China (pp. 1-7). Association for Computing Machinery (ACM)
Data generation and sharing for robust intrusion detection in IoT systems [2021-02423_Vinnova]; Uppsala University; Publications
Kaveh, A., Rohner, C. & Johnsson, A. (2024). Impact of Attack Variations and Topology on IoT Intrusion Detection Model Generalizability. In: 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS): . Paper presented at 21st IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Sep 23-25, 2024, Seoul, South Korea (pp. 364-370). Institute of Electrical and Electronics Engineers (IEEE)
Ett hållbart IoT genom organiska batterier [2023-00638_Vinnova]; Uppsala UniversityRobust IoT Security: Intrusion Detection Leveraging Contributions from Multiple Systems [2023-02982_Vinnova]; Uppsala UniversityCollaborative Computations to Enable Security in the Battery-less Internet of Things [2024-05758_VR]; Uppsala University; Publications
Piumwardane, D., Padmal, M., Rohner, C. & Voigt, T. (2025). Desynchronized Querying of Analog Backscatter Tags. In: : . Paper presented at 2025 21st International Conference on Distributed Computing in Sensor Systems (DCOSS-IoT), Tuscany, Italy, 9-11 June, 2025. Institute of Electrical and Electronics Engineers (IEEE)
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-1527-734X

Search in DiVA

Show all publications