Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
Link to record
Permanent link

Direct link
Rodhe, Ioana
Publications (10 of 14) Show all publications
Borgström, J., Gutkovas, R., Rodhe, I. & Victor, B. (2015). The Psi-Calculi Workbench: A Generic Tool for Applied Process Calculi. ACM Transactions on Embedded Computing Systems, 14(1), Article ID 9.
Open this publication in new window or tab >>The Psi-Calculi Workbench: A Generic Tool for Applied Process Calculi
2015 (English)In: ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, E-ISSN 1558-3465, Vol. 14, no 1, article id 9Article in journal (Refereed) Published
Abstract [en]

Psi-calculi is a parametric framework for extensions of the pi-calculus with arbitrary data and logic. All instances of the framework inherit machine-checked proofs of the metatheory such as compositionality and bisimulation congruence. We present a generic analysis tool for psi-calculus instances, enabling symbolic execution and (bi)simulation checking for both unicast and broadcast communication. The tool also provides a library for implementing new psi-calculus instances. We provide examples from traditional communication protocols and wireless sensor networks. We also describe the theoretical foundations of the tool, including an improved symbolic operational semantics, with additional support for scoped broadcast communication.

National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:uu:diva-233750 (URN)10.1145/2682570 (DOI)000349302200009 ()
Projects
ProFuNUPMARC
Funder
Swedish Foundation for Strategic Research , RIT08­0065
Available from: 2015-01-21 Created: 2014-10-09 Last updated: 2018-01-11Bibliographically approved
Borgström, J., Gutkovas, R., Rodhe, I. & Victor, B. (2013). A Parametric Tool for Applied Process Calculi. In: 13th International Conference on Application of Concurrency to System Design (ACSD 2013): . Paper presented at 13th International Conference on Application of Concurrency to System Design (ACSD), Barcelona, Spain, July 8 - 10, 2013 (pp. 180-185). IEEE Computer Society
Open this publication in new window or tab >>A Parametric Tool for Applied Process Calculi
2013 (English)In: 13th International Conference on Application of Concurrency to System Design (ACSD 2013), IEEE Computer Society, 2013, p. 180-185Conference paper, Published paper (Refereed)
Abstract [en]

High-level formalisms for concurrency are often defined as extensions of the the pi-calculus; a growing number is geared towards particular applications or computational paradigms. Psi-calculi is a parametric framework that can accommodate a wide spectrum of such calculi. It allows the definition of process calculi that extend the pi-calculus with arbitrary data, logic and logical assertions. All such psi calculi inherit machine-checked proofs of the meta-theory such as compositionality and bisimulation congruence.

We present a generic tool for analysing processes from any psi calculus instance, and for implementing new instances with the help of a supporting library. The tool implements symbolic execution and bisimulation algorithms for both unicast and wireless broadcast communication. We illustrate the tool by examples from pi-calculus and the area of wireless sensor networks.

Place, publisher, year, edition, pages
IEEE Computer Society, 2013
Series
International Conference on Application of Concurrency to System Design, ISSN 1550-4808
National Category
Computer Sciences
Research subject
Computing Science
Identifiers
urn:nbn:se:uu:diva-203381 (URN)10.1109/ACSD.2013.22 (DOI)000333827300019 ()978-0-7695-5035-0 (ISBN)
Conference
13th International Conference on Application of Concurrency to System Design (ACSD), Barcelona, Spain, July 8 - 10, 2013
Projects
ProFuNUPMARC
Funder
Swedish Foundation for Strategic Research , RIT08-0065
Available from: 2013-07-09 Created: 2013-07-09 Last updated: 2018-01-11Bibliographically approved
Åman Pohjola, J., Borgström, J., Parrow, J., Raabjerg, P. & Rodhe, I. (2013). Negative premises in applied process calculi.
Open this publication in new window or tab >>Negative premises in applied process calculi
Show others...
2013 (English)Report (Other academic)
Abstract [en]

We explore two applications of negative premises to increase the expressive power of psi-calculi: reliable broadcasts and priorities. Together, these can be used to model discrete time, which we illustrate with an example from automotive applications. The negative premises can be encoded by a two-level structural operational semantics without negative premises; we use this fact to prove the standard congruence and structural laws of bisimulation with Nominal Isabelle.

Series
Technical report / Department of Information Technology, Uppsala University, ISSN 1404-3203 ; 2013-014
National Category
Computer Sciences
Identifiers
urn:nbn:se:uu:diva-229004 (URN)
Available from: 2013-06-20 Created: 2014-07-25 Last updated: 2024-05-30Bibliographically approved
Ngai, E.-H. C. H. & Rodhe, I. (2013). On providing location privacy for mobile sinks in wireless sensor networks. Wireless networks, 19(1), 115-130
Open this publication in new window or tab >>On providing location privacy for mobile sinks in wireless sensor networks
2013 (English)In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 19, no 1, p. 115-130Article in journal (Refereed) Published
National Category
Communication Systems Computer Sciences
Identifiers
urn:nbn:se:uu:diva-179945 (URN)10.1007/s11276-012-0454-z (DOI)000312744400008 ()
Projects
WISENETProFuN
Available from: 2012-06-05 Created: 2012-08-27 Last updated: 2018-01-12Bibliographically approved
Rodhe, I., Rohner, C. & Ngai, E.-H. C. H. (2012). On location privacy and quality of information in participatory sensing. In: Proc. 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Paper presented at 8th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks (Q2SWinet) in Conjunction with the 15th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 24-25 October, 2012, Paphos, CYPRUS (pp. 55-62). New York: ACM Press
Open this publication in new window or tab >>On location privacy and quality of information in participatory sensing
2012 (English)In: Proc. 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks, New York: ACM Press, 2012, p. 55-62Conference paper, Published paper (Refereed)
Abstract [en]

Participatory sensing applications typically bind sensor data to locations. Location privacy preserving mechanisms protecting the location of users introduce therefore an uncertainty in the collected data distributions. We consider two strategies to reconstruct a data distribution after k-anonymity has been applied to the users' location information. We investigate how different parameters for the location privacy preserving mechanism influence both the quality of information and the location privacy of the users. Our results show that the cloak area resulted from applying k-anonymity has a higher impact on both the quality of information and the location privacy than the number of users, k, that are cloaked together.

Place, publisher, year, edition, pages
New York: ACM Press, 2012
National Category
Communication Systems
Identifiers
urn:nbn:se:uu:diva-179948 (URN)10.1145/2387218.2387229 (DOI)000312650800008 ()978-1-4503-1619-4 (ISBN)
Conference
8th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks (Q2SWinet) in Conjunction with the 15th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 24-25 October, 2012, Paphos, CYPRUS
Projects
ProFuNWISENET
Available from: 2012-10-25 Created: 2012-08-27 Last updated: 2013-02-04Bibliographically approved
Rodhe, I. (2012). Secure and Privacy-Aware Data Collection in Wireless Sensor Networks. (Doctoral dissertation). Uppsala: Acta Universitatis Upsaliensis
Open this publication in new window or tab >>Secure and Privacy-Aware Data Collection in Wireless Sensor Networks
2012 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it.

Only authorized queries should be allowed in the network and the integrity and confidentiality of the data that is being collected should be protected. We propose a layered key distribution scheme together with two protocols for query authentication and confidential data aggregation. The layered key distribution is more robust to node and communication failures than a predefined tree structure. The protocols are secure under the assumption that less than n sensor nodes are compromised. n is a design parameter that allows us to trade off security for overhead. When more than n sensor nodes are compromised, our simulations show that the attacker can only introduce unauthorized queries into a limited part of the network and can only get access to a small part of the data that is aggregated in the network. Considering the data collection protocol we also contribute with strategies to reduce the energy consumption of an integrity preserving in-network aggregation scheme to a level below the energy consumption of a non-aggregation scheme. Our improvements reduce node congestion by a factor of three and the total communication load by 30%.

Location privacy of the users carrying mobile devices is another aspect considered in this thesis. Considering a mobile sink that collects data from the network, we propose a strategy for data collection that requires no information about the location and movement pattern of the sink. We show that it is possible to provide data collection services, while protecting the location privacy of the sink. When mobile phones with built-in sensors are used as sensor nodes, location information about where the data has been sensed can be used to trace users and infer other personal information about them, like state of health or personal preferences. Therefore, location privacy preserving mechanisms have been proposed to provide location privacy to the users. We investigate how a location privacy preserving mechanism influences the quality of the collected data and consider strategies to reconstruct the data distribution without compromising location privacy.

Place, publisher, year, edition, pages
Uppsala: Acta Universitatis Upsaliensis, 2012. p. 196
Series
Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology, ISSN 1651-6214 ; 968
Keywords
Secure Data Collection, Key Distribution, Location Privacy, Quality of Information, Wireless Sensor Networks
National Category
Computer Sciences Communication Systems
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-180087 (URN)978-91-554-8463-7 (ISBN)
Public defence
2012-11-14, Polhemsalen, Ångströmlaboratoriet, Lägerhyddsvägen 1, Uppsala, 13:15 (English)
Opponent
Supervisors
Projects
WISENET
Funder
Vinnova, P26628-4
Available from: 2012-10-18 Created: 2012-08-29 Last updated: 2018-01-12Bibliographically approved
Sutic, D., Rodhe, I., Rohner, C. & Victor, B. (2011). Lower trees with fixed degrees: a recipe for efficient secure hierarchical aggregation in WSNs. In: 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). Paper presented at IEEE Wireless Communications and Networking Conference, MAR 28-31 2011, Cancun Mexico (pp. 659-664). IEEE Computer Society
Open this publication in new window or tab >>Lower trees with fixed degrees: a recipe for efficient secure hierarchical aggregation in WSNs
2011 (English)In: 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), IEEE Computer Society, 2011, p. 659-664Conference paper, Published paper (Refereed)
Abstract [en]

We propose two strategies to reduce energy consumption for secure data aggregation in wireless sensor networks. While the purpose of data aggregation is to reduce energy consumption, secure data aggregation introduces an overhead making the total energy consumption comparable to naive secure non-aggregation. Another aspect is that the secure data aggregation has higher node congestion than non-aggregation schemes for networks of sizes up to about 100 nodes. Considering a secure data aggregation protocol, our strategies are to reduce the height of the aggregation tree and limit its node degree. The former results in fewer verification messages and a lower total communication load, and the latter reduces node congestion. The most heavily burdened node sends a third of the messages required in the original protocol, which for small networks is lower than with non-aggregation, and the total communication load is lowered compared to non-aggregation.

Place, publisher, year, edition, pages
IEEE Computer Society, 2011
National Category
Computer Sciences Computer Engineering
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-140986 (URN)10.1109/WCNC.2011.5779211 (DOI)000297160200112 ()978-1-61284-254-7 (ISBN)
Conference
IEEE Wireless Communications and Networking Conference, MAR 28-31 2011, Cancun Mexico
Projects
ProFunWISENET
Available from: 2011-01-10 Created: 2011-01-10 Last updated: 2018-01-12Bibliographically approved
Folke, M., Hermans, F., Rodhe, I., Björkman, M., Lindén, M. & Gunningberg, P. (2011). Mobile system for establishing the lactate threshold by analysing the respiratory air. In: Proc. 2nd International Conference on Ambulatory Monitoring of Physical Activity and Movement: (pp. 102-102). Scotland: Glasgow Caledonian University
Open this publication in new window or tab >>Mobile system for establishing the lactate threshold by analysing the respiratory air
Show others...
2011 (English)In: Proc. 2nd International Conference on Ambulatory Monitoring of Physical Activity and Movement, Scotland: Glasgow Caledonian University , 2011, p. 102-102Conference paper, Poster (with or without abstract) (Refereed)
Place, publisher, year, edition, pages
Scotland: Glasgow Caledonian University, 2011
National Category
Computer Engineering Communication Systems
Identifiers
urn:nbn:se:uu:diva-163055 (URN)
Projects
WISENET
Available from: 2011-05-27 Created: 2011-12-07 Last updated: 2018-01-12Bibliographically approved
Rodhe, I. & Rohner, C. (2010). Secure Overlays: Making Static Key Distribution Schemes Work with Mobile Base Stations in WSNs. In: Evgeny Osipov, Andreas Kassler, Thomas Michael Bohnert, Xavier Masip-Bruin (Ed.), Wired/Wireless Internet Communications. Paper presented at 8th International Conference, WWIC 2010, Luleå, Sweden, June 1-3, 2010 (pp. 386-397). Berlin: Springer-Verlag
Open this publication in new window or tab >>Secure Overlays: Making Static Key Distribution Schemes Work with Mobile Base Stations in WSNs
2010 (English)In: Wired/Wireless Internet Communications / [ed] Evgeny Osipov, Andreas Kassler, Thomas Michael Bohnert, Xavier Masip-Bruin, Berlin: Springer-Verlag , 2010, p. 386-397Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Berlin: Springer-Verlag, 2010
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 6074
National Category
Computer and Information Sciences
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-136002 (URN)10.1007/978-3-642-13315-2_32 (DOI)000279615600032 ()978-3-642-13314-5 (ISBN)
Conference
8th International Conference, WWIC 2010, Luleå, Sweden, June 1-3, 2010
Projects
WISENET
Available from: 2010-12-09 Created: 2010-12-09 Last updated: 2018-01-12Bibliographically approved
Rodhe, I. & Rohner, C. (2009). A study of the message complexity for integrity preserving aggregation schemes used in wireless sensor networks. Paper presented at 6th Swedish National Computer Networking Workshop. Uppsala, Sweden
Open this publication in new window or tab >>A study of the message complexity for integrity preserving aggregation schemes used in wireless sensor networks
2009 (English)Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Uppsala, Sweden: , 2009
National Category
Engineering and Technology
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-136090 (URN)
Conference
6th Swedish National Computer Networking Workshop
Projects
WISENET
Available from: 2010-12-09 Created: 2010-12-09 Last updated: 2013-01-23Bibliographically approved
Organisations

Search in DiVA

Show all publications