The 44th IEEE Conference on Local Computer Networks (LCN), October 14-17, 2019, Osnabrück, Germany


Accepted Demos

IDN-Laser-VR: A Demonstration of Real-Time Multimedia Streaming in Local Networks Using the ILDA Digital Network Protocol
Authors: Matthias Frank and Fabian Marquardt (University of Bonn, Germany)
Abstract: ILDA Digital Network (IDN) is a novel protocol providing digital data transmission for laser projectors. While the new standard mainly aims to replace the old analog signal transmission, the UDP-based streaming protocol also enables completely new applications. In this demonstration we show a prototype for real-time visualization of IDN data streams using a virtual reality headset.

Crypto CAN't - Confidentiality and Privacy for CAN/ISOBUS Networks in Precision Agriculture
Authors: Jan Bauer (University of Osnabrück & Institute of Computer Science, Germany); René Helmke, Till Zimmermann and Alexander Bothe (University of Osnabrück, Germany); Michel Löpmeier (Competence Center ISOBUS, Germany); Nils Aschenbruck (University of Osnabrück, Germany)
Abstract: Modern agricultural machines and implements are equipped with numerous embedded sensors, producing extensive machine and environmental data that often contains personal and privacy-sensitive information. Data streams are transmitted via ISOBUS, an internal vehicle bus, which relies on the Controller Area Network (CAN) standard. However, neither ISOBUS nor CAN take privacy aspects into account. Thus, particularly with respect to the increasing interconnectivity of machinery, serious security concerns arise. In this paper, we briefly introduce our modular privacy framework CAN't that allows to purposefully filter, manipulate, and encrypt data streams in the context of Precision Agriculture. The demo will present an open source prototype, realized using low-cost off-the-shelf hardware. Its technical feasibility and its benefits will be showcased with exemplary privacy filters using a commercial ISOBUS simulator and a customized simulator based on a video game.

Demo: Privacy-aware Visual Information Protection for Mobile Mixed Reality
Authors: Jaybie A de Guzman (University of New South Wales & Data 61, Australia); Kanchana Thilakarathna (The University of Sydney, Australia); Aruna Seneviratne (University of New South Wales, Australia)
Abstract: SafeMR is a proof-of-concept visual information access control for mobile mixed reality (MR). It leverages on existing object detection algorithms to detect target objects in a scene. The detected objects can, then, be mapped on to their 3D positions in the scene using synchronous localization and mapping (SLAM) capabilities employed by MR tool kits (e.g. ARKit, and ARCore) to provide an immersive MR experience. SafeMR provides a variable-level privacy interface that allows users to specify which objects in the scene can be accessed by third-party applications that requires such 3D information for certain targets within the scene. As a result, privacy properties of confidentiality and content awareness are guaranteed.

Multi-Strategy Simulation of Aerial Post-Disaster Ad Hoc Communication Support Systems
Authors: Julian Zobel, Patrick Lieser and Ralf Steinmetz (Technische Universität Darmstadt, Germany)
Abstract: In case of destroyed or impaired infrastructure due to natural catastrophes, mobile devices such as smartphones can be used to create civilian ad hoc networks to provide basic means of communication. Due to the human behavior to form groups and cluster around significant locations in such situations, however, the network is often heavily intermittent, and thus, communication between clusters is impossible. Aerial Post-Disaster Ad Hoc Communication Support Systems can overcome the gaps between clusters, but the performance is highly dependent on factors like the applied strategy, the amount of UAVs, or their technical specifications. In this demonstration, we present different support strategies in an urban post-disaster scenario. Attendees can interact and select strategies and explore different strategy parameter settings, while observing the effect on the network performance and, additionally, gaining a comprehensive insight into the strategy behavior. The interaction with the demonstration underlines the vast amount of different settings and influence factors that have to be taken into account when selecting and adapting a strategy suitable for the current situation, as motivated in our accompanying main conference paper.

Link 'Em: An Open Source Link Emulation Bridge for Reproducible Networking Research
Authors: Stefanie Thieme (University of Osnabrück, Germany); Bertram Schütz, Nils Aschenbruck, Leonhard Brüggemann and Dominic Laniewski (University of Osnabrück, Germany)
Abstract: This paper presents link 'em, an open source link emulation bridge for reproducible networking research. While reproducibility is one keystone of good research, most available link emulators are lacking crucial features or are prohibitively expensive. Link 'em is a Raspberry Pi-based layer-2 bridge that runs an extended version of netem in conjunction with a trace database to achieve reproducible link emulation. By invoking our novel packet loss module, which builds upon sagemath and NetfilterQueue, more sophisticated packet loss models can be used in addition to netem's existing ones. The proposed demonstration verifies the achieved reproducibility. This is done by showing the effects of a model-based link emulation via netem and a trace-based emulation using our link 'em bridge on a video live stream, compared to a pre-captured reference stream.

CoRE-RD for Run-time Configuration of IoT Devices
Authors: Martine S. Lenders (Freie Universität Berlin, Germany); Thomas C. Schmidt (Hamburg University of Applied Sciences, Germany); Matthias Wählisch (Freie Universität Berlin, Germany)
Abstract: In this demo, we showcase a user interface to configure the interaction of sensors and actuators in a constrained resource network. We use CoRE-RD to discover those resources and determine their functionality. This is presented as a game where the targets of player actions are configurable. A number of IoT nodes, based on the RIOT operating system exist in the game network representing different resource types. With Core-RD we are able to find and identify those nodes. They can then be presented to our configuration interface to be exposed to the user in a simple drag-and-drop interface. Our demo shows that in this way CoRE-RD can be used to enable intuitive configuration by the user.

Intent-based Fog Computing with FogFlow
Authors: Bin Cheng (NEC Laboratories Europe GmbH, Germany); Gürkan Solmaz and Flavio Cirillo (NEC Laboratories Europe, Germany)
Abstract: IoT devices are connected and often with limited computation and battery lifetime. To extend their capability and make them smarter, some kinds of edge intelligence is required. Fog computing has been advertised as a new paradigm to host such edge intelligence as IoT services by making computation and storage resources more close to IoT devices. However, this introduces lots of complexities and new challenges for programming and managing those IoT services in a shared and geo-distributed infrastructure. To ease the design and management of IoT services, we propose an intent-based fog computing framework called FogFlow, which is an open source fog computing framework with user-friendly interface. So far, FogFlow has been widely used by many research projects and also industrial proof-of-concept systems. In this demo, we are going to showcase its latest programming model with two implemented use cases.

Demo Board

Demonstration chair: Katrin Reitsma, Motorola Solutions, USA

  • Kemal Akkaya, Florida International University, USA
  • Pranshu Bajpai, Michigan State University, USA
  • Adel Ben Mnaouer, Canadian University of Dubai, UAE
  • Joe Bumblis, IEEE TCCC Executive Committee, USA
  • Amine Dhraief, University of Manouba, Tunisia
  • Matthias Hollick, Technische Universität Darmstadt, Germany
  • Gary Kessler, Embry-Riddle Aeronautical University, USA
  • Olivier Mehani, Learnosity, Australia
  • Tom Messerges, Motorola Solutions, USA
  • Tom Pfeiffer, IoT Consult Europe, Germany
  • Tim Strayer, BBN Technologies, USA
  • Damla Turgut, University of Central Florida, USA