scispace - formally typeset
Search or ask a question
Author

Marko Hännikäinen

Bio: Marko Hännikäinen is an academic researcher from Tampere University of Technology. The author has contributed to research in topics: Wireless sensor network & Wireless network. The author has an hindex of 27, co-authored 128 publications receiving 3061 citations.


Papers
More filters
Proceedings ArticleDOI
05 Sep 2004
TL;DR: This paper evaluating the suitability of the new Unified Modelling Language (UML) 2.0 for the design and implementation of embedded wireless local area network (WLAN) protocols found adequate performance for the protocol with time-critical functionality on the target platform.
Abstract: This paper evaluates the suitability of the new Unified Modelling Language (UML) 2.0 for the design and implementation of embedded wireless local area network (WLAN) protocols. UML 2.0 introduces several new features and improvements to semantics, diagram types, and notations of the language. Behaviour in UML 2.0 can be described accurately and precisely, which enables automatic source code (C/C++ for example) generation for creating executable models. A medium access control (MAC) protocol called TUTMAC was designed and implemented with UML 2.0, and integrated into a hardware platform. The implementation with UML 2.0 reached adequate performance for the protocol with time-critical functionality on the target platform.

12 citations

Book ChapterDOI
11 May 2011
TL;DR: This paper presents a link quality-based lightweight channel selection mechanism that discovers low interference and lightly loaded channels, thus improving latency, reliability, and throughput in wireless Sensor Networks.
Abstract: Wireless Sensor Networks (WSN) consist of autonomous and intelligent nodes that combine sensing, actuation, and distributed computing with small size and low energy One of the major issues is overcoming the non-ideality of unreliable real-world wireless links and avoiding interferences This paper presents a link quality-based lightweight channel selection mechanism that discovers low interference and lightly loaded channels, thus improving latency, reliability, and throughput The mechanism grades a channel from link reliability and changes the channel on interference The proposed selection is suitable for resource and energy constrained WSNs as it does not require any extra communication or channel sensing The channel selection is implemented with a low energy 24GHz multihop mesh WSN using 1mW transmission power In practical measurements in a typical office environment with 100mW WLAN interference, the selection had 96% average link reliability compared to the 84% of randomized channel selection

12 citations

Proceedings ArticleDOI
11 Sep 2005
TL;DR: According to the analysis, the optimization decreases the average network energy consumption up to an order of magnitude, and the optimal beacon transmission rate is derived for a TUTWSN prototype by power analysis and energy models.
Abstract: Resource constrained wireless sensor networks (WSN) require an energy efficient medium access control (MAC) protocol that minimizes the radio active time (duty cycle). Time slotted MAC schemes provide lowest duty cycles by dividing time into consecutive data exchange and sleep periods. Synchronization for data exchange and network maintenance is achieved by exchanging beacons. For detecting changes in network topology, nodes periodically perform scanning during which beacons are received from neighbors. This is energy consuming, and the energy required equals to the transmission of thousands of packets. This paper shows that the energy consumption is mainly depending on the beacon transmission rate, and that an optimal rate is a function of three parameters: a network scanning interval, beacon transmission energy, and radio reception power. The optimal beacon transmission rate is derived for a TUTWSN prototype by power analysis and energy models. According to the analysis, the optimization decreases the average network energy consumption up to an order of magnitude. For the prototype, the optimal beacon transmission rate is 3.7 Hz, when network scanning is performed with 2 minutes intervals

12 citations

Journal ArticleDOI
TL;DR: The goal is to define generic requirements management domain concepts and abstract interfaces between requirements management and system development, which leads to a portable requirements management meta-model which can be adapted with various system modeling languages.
Abstract: Software and embedded system companies today encounter problems related to requirements management tool integration, incorrect tool usage, and lack of traceability. This is due to utilized tools with no clear meta-model and semantics to communicate requirements between different stakeholders. This paper presents a comprehensive meta-model for requirements management. The focus is on software and embedded system domains. The goal is to define generic requirements management domain concepts and abstract interfaces between requirements management and system development. This leads to a portable requirements management meta-model which can be adapted with various system modeling languages. The created meta-model is prototyped by translating it into a UML profile. The profile is imported into a UML tool which is used for rapid evaluation of meta-model concepts in practice. The developed profile is associated with a proof of concept report generator tool that automatically produces up-to-date documentation from the models in form of web pages. The profile is adopted to create an example model of embedded system requirement specification which is built with the profile.

12 citations

Proceedings ArticleDOI
11 Sep 2005
TL;DR: Evaluation of the performance of IEEE 802.11b WLAN for supporting multihop voice over IP (VoIP) service using the NS-2 network simulator and the mean opinion score (MOS) shows that the mean number of hops between a VoIP transmitter and receiver has the main effect on the number of calls with acceptable quality.
Abstract: This paper evaluates the performance of IEEE 802.11b WLAN for supporting multihop voice over IP (VoIP) service. Evaluation is carried out using the NS-2 network simulator and the mean opinion score (MOS) as a criteria for measuring the quality of a VoIP connection. The results show that the mean number of hops between a VoIP transmitter and receiver has the main effect on the number of calls with acceptable quality. On a small network where connections cause interference to each other already three hops cause problems. The mean number of hops can be decreased with a supporting access point (AP) infrastructure. Also the type of interfering traffic affects. The voice quality in VoIP is sensitive to transmission losses, and VoIP cannot compete equally with high data rate applications

11 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal ArticleDOI
01 Nov 2007
TL;DR: Comprehensive performance comparisons including accuracy, precision, complexity, scalability, robustness, and cost are presented.
Abstract: Wireless indoor positioning systems have become very popular in recent years. These systems have been successfully used in many applications such as asset tracking and inventory management. This paper provides an overview of the existing wireless indoor positioning solutions and attempts to classify different techniques and systems. Three typical location estimation schemes of triangulation, scene analysis, and proximity are analyzed. We also discuss location fingerprinting in detail since it is used in most current system or solutions. We then examine a set of properties by which location systems are evaluated, and apply this evaluation method to survey a number of existing systems. Comprehensive performance comparisons including accuracy, precision, complexity, scalability, robustness, and cost are presented.

4,123 citations

Book ChapterDOI
28 Sep 2011
TL;DR: This work considers the resistance of ciphers, and LED in particular, to related-key attacks, and is able to derive simple yet interesting AES-like security proofs for LED regarding related- or single- key attacks.
Abstract: We present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals. First, we explore the role of an ultra-light (in fact non-existent) key schedule. Second, we consider the resistance of ciphers, and LED in particular, to related-key attacks: we are able to derive simple yet interesting AES-like security proofs for LED regarding related- or single-key attacks. And third, while we provide a block cipher that is very compact in hardware, we aim to maintain a reasonable performance profile for software implementation.

848 citations

Book ChapterDOI
30 Aug 2009
TL;DR: A new family of very efficient hardware oriented block ciphers divided into two flavors, which is more compact in hardware, as the key is burnt into the device (and cannot be changed), and achieves encryption speed of 12.5 KBit/sec.
Abstract: In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers divided into two flavors. All block ciphers share the 80-bit key size and security level. The first flavor, KATAN, is composed of three block ciphers, with 32, 48, or 64-bit block size. The second flavor, KTANTAN, contains the other three ciphers with the same block sizes, and is more compact in hardware, as the key is burnt into the device (and cannot be changed). The smallest cipher of the entire family, KTANTAN32, can be implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48, which is the version we recommend for RFID tags uses 588 GE, whereas KATAN64, the largest and most flexible candidate of the family, uses 1054 GE and has a throughput of 25.1 Kbit/sec (at 100 KHz).

733 citations