Open Access Open Access  Restricted Access Subscription Access


Bernhard Großwindhager, Astrid Rupp, Martin Tappler, Markus Tranninger, Samuel Weiser, Bernhard K. Aichernig, Carlo Alberto Boano, Martin Horn, Gernot Kubin, Stefan Mangard, Martin Steinberger, Kay Römer


The Internet of Things (IoT) extends the Internet to include also wireless embedded computers that are often equipped with sensors and actuators to monitor and control their physical environment. The IoT is increasingly used for safety-critical applications such as smart factories or networked cars, where a failure of the IoT may lead to catastrophic consequences. The IoT is therefore in urgent need of dependability, where reliability, availability, and security properties can be guaranteed even in harsh environments (e.g., radio interference) and under deliberate attacks (e.g., exploiting side channels). In this paper we give an overview of recent research activities in the LEAD project “Dependable Internet of Things in Adverse Environments” towards a dependable IoT, specifically dependable wireless communication and localization using Ultra-Wide-Band technology, secure execution of real-time software, protocol testing and verification, and dependable networked control. We also present the TruckLab testbed, where our research results can be integrated and validated in a platooning use case. In this testbed, model trucks are automatically controlled to follow a lead truck.


Dependability; Internet of Things; Car2X; UWB; Security; Testing; Networked Control.

Full Text:



B. Kempke, et al., “SurePoint: Exploiting ultra wideband flooding and diversity to provide robust, scalable, high-fidelity indoor localization,” Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, 2016.

S. Marano, W. M. Gifford, H. Wymeersch and M. Z. Win, “NLOS identification and mitigation for localization based on UWB experimental data,” IEEE Journal on Selected Areas in Communications, Vol. 28, No. 7, pp. 1026-1035, 2010.

Decawave, [Online]. Available:

Y. Yarom, D. Genkin and N. Heninger, “CacheBleed: a timing attack on OpenSSL constant-time RSA,” Journal of Cryptographic Engineering, Vol. 7, No. 2, pp. 99-112, 2017.

G. Doychev, B. Köpf, L. Mauborgne and J. Reineke, “CacheAudit: A tool for the static analysis of cache side channels,” ACM Transactions on Information and System Security, Vol. 18, No. 1, pp. 4:1-4:32, 2015.

G. V. Bochmann and A. Petrenko, “Protocol testing: review of methods and relevance for software testing,” Proceedings of the 1994 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 109-124, 1994.

B. Steffen, F. Howar, and M. Merten, “Introduction to active automata learning from a practical perspective,” Lecture Notes in Computer Science, Vol. 6659, pp. 256–296, 2011.

M. Tappler, B. K. Aichernig, and R. Bloem, “Model-based testing IoT communication via active automata learning,” Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, pp. 276–287, 2017.

B. K. Aichernig, M. Tappler, “Learning from faults: Mutation testing in active automata learning,” Lecture Notes in Computer Science, Vol. 10227, pp. 19–34, 2017

B. K. Aichernig, M. Tappler, “Probabilistic black-box reachability checking,” Lecture Notes in Computer Science, Vol. 10548, 2017.

Edited by Andrew Banks and Rahul Gupta, “MQTT Version 3.1.1. OASIS Standard”, October 2014.

D. Angluin, “Learning regular sets from queries and counterexamples,” Inf. Comput., Vol. 75, No. 2, pp. 87–106, 1987.

Mosquitto, [Online]. Available:

HBMQTT, [Online]. Available:

J. Ludwiger, et. al., “Towards networked sliding mode control,” Proceedings of the 56th IEEE Conference on Decision and Control, 2017.

Tamiya Modelltrucks, [Online]. Available:

BeagleBone Black Board, [Online]. Available:

MATLAB Support Package for BeagleBone Black Hardware, [Online]. Available:

A. Manecy, N. Marchand, and S. Viollet. “RT-MaG: An open-source SIMULINK toolbox for linux-based real-time robotic applications,” Proceedings of the IEEE International Conference on Robotics and Biomimetics (ROBIO 2014), 2014.

RT PREEMPT patch for BeagleBone, [Online]. Available:

Logitech WebCam C930e, [Online]. Available:

E. Olson. “AprilTag: A robust and flexible visual fiducial system,” Proceedings of the IEEE International Conference on Robotics and Automation, 2011.

AprilTags C++ Library, [Online]. Available:

European truck platooning challenge, [Online]. Available:

A. Alam, J. Mårtensson, and K.H. Johansson. “Experimental evaluation of decentralized cooperative cruise control for heavy-duty vehicle platooning,” Control Engineering Practice, Vol. 38, pp. 11–25, 2015.


  • There are currently no refbacks.