Automated and Reproducible Application Traces Generation for IoT Applications

In this paper, we investigate and present how to generate application traces of IoT (Internet of Things) Applications in an automated, repeatable and reproducible manner. By using the FIT IoT-Lab large scale testbed and relying on state-of-the-art software engineering techniques, we are able to produce, collect and share artifacts and datasets in an automated way. This makes it easy to track the impact of software updates or changes in the radio environment both on a small scale, e.g. during a single day, and on a large scale, e.g. during several weeks. By providing both the source code for the trace generation as well as the resulting datasets, we hope to reduce the learning curve to develop such applications and encourage re-usability as well as pave the way for the replication of our results. While we focus in this work on IoT networks, we believe such an approach could be of used in many other networking domains.

[1]  Andrzej Duda,et al.  WalT: A reproducible testbed for reproducible network experiments , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[2]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[3]  Nei Kato,et al.  An Intelligent Traffic Load Prediction-Based Adaptive Channel Assignment Algorithm in SDN-IoT: A Deep Learning Approach , 2018, IEEE Internet of Things Journal.

[4]  Manuel López Martín,et al.  Neural network architecture based on gradient boosting for IoT traffic prediction , 2019, Future Gener. Comput. Syst..

[5]  Kristina Lerman,et al.  A Survey on Bias and Fairness in Machine Learning , 2019, ACM Comput. Surv..

[6]  Vijay Sivaraman,et al.  Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics , 2019, IEEE Transactions on Mobile Computing.

[7]  Roberto Di Cosmo,et al.  Referencing Source Code Artifacts: A Separate Concern in Software Citation , 2020, Computing in Science & Engineering.

[8]  Jeffrey Perkel Challenge to scientists: does your ten-year-old code still run? , 2020, Nature.

[9]  Konstantinos Tserpes,et al.  Leveraging User Mobility and Mobile App Services Behavior for Optimal Edge Resource Utilization , 2019, COINS.

[10]  Andres Löh,et al.  NixOS: a purely functional Linux distribution , 2008, ICFP.

[11]  Alex M. Warren Repeatability and Benefaction in Computer Systems Research — A Study and a Modest Proposal , 2015 .

[12]  Eric Fleury,et al.  FIT IoT-LAB: A large scale open experimental IoT testbed , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[13]  Zhu Xiao,et al.  TrajData: On Vehicle Trajectory Collection With Commodity Plug-and-Play OBU Devices , 2020, IEEE Internet of Things Journal.

[14]  Andreas Biri,et al.  Dataset: Wireless Link Quality Estimation on FlockLab - and Beyond , 2019, DATA@SenSys.

[15]  Alexandros Psychas,et al.  Mapping of Quality of Service Requirements to Resource Demands for IaaS , 2019, CLOSER.

[16]  Miltos Petridis,et al.  Dynamic Scheduling of Virtual Machines Running HPC Workloads in Scientific Grids , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[17]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[18]  Major Singh Goraya,et al.  Fault tolerance in cloud computing environment: A systematic survey , 2018, Comput. Ind..

[19]  Soledad Escolar,et al.  A Testbed and an Experimental Public Dataset for Energy-Harvested IoT Solutions , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).

[20]  Anuj Kumar,et al.  Sensing, Controlling, and IoT Infrastructure in Smart Building: A Review , 2019, IEEE Sensors Journal.

[21]  Roberto Di Cosmo,et al.  Software Heritage: Why and How to Preserve Software Source Code , 2017, iPRES.

[22]  Attila Kertesz,et al.  A Crawling Approach to Facilitate Open IoT Data Archiving and Reuse , 2019, 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS).

[23]  Mariacarla Calzarossa,et al.  Workload Characterization , 2016, ACM Comput. Surv..

[24]  Eelco Dolstra,et al.  The purely functional software deployment model , 2006 .

[25]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[26]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[27]  Thomas C. Schmidt,et al.  RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[28]  Virender Ranga,et al.  Machine Learning Based Intrusion Detection Systems for IoT Applications , 2019, Wireless Personal Communications.

[29]  Kazem Sohraby,et al.  IoT Considerations, Requirements, and Architectures for Smart Buildings—Energy Optimization and Next-Generation Building Management Systems , 2017, IEEE Internet of Things Journal.

[30]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..