Vesna Manojlovic

Results of the First IoT Hackathon

Vesna Manojlovic
Contributors: Adonis Stergiopoulos, Constanze Dietrich, Sandoche BALAKRICHENAN, Mirjam Kühne, Matthias Wählisch

10 min read

The tenth RIPE NCC hackathon took on the Internet of Things (IoT). Over two days, community members experimented with possible IoT solutions.


How it all started

Logo of IoT Hackathon

At RIPE 78, we sent out a survey on RIPE Labs, asking what topics people would like to have a hackathon on. IoT was one of the favourites and coupled with the support of an enthusiastic organising committee, made it an easy choice.

The topic itself is admittedly very broad and we deliberately didn’t narrow the scope further, leaving participants free to come up with their own projects. We wanted to bring community members together and build useful IoT solutions that will benefit the wider Internet community.

We had several IoT experts who volunteered to help us organise the event:

  • Constanze Dietrich, Lexta Consultants Group
  • Sandoche Balakrichenan, IoT-WG co-chair
  • Jim Reid, IoT-WG co-chair
  • Matthias Wählisch, Freie Universität Berlin and RIOT

And people from the RIPE NCC:

  • Mirjam Kühne
  • Vesna Manojlovic

Photo of IoT Hackathon participants

Participants of the IoT Hackathon Rotterdam 2019

And so, we picked a date and met remotely for four months to make it happen! We thought it would be a good opportunity to combine the hackathon with RIPE 79 and present the results at the next IoT Working Group.

We opened the applications to front-end developers, back-end developers, UX designers and everyone who is passionate (or skeptical) about IoT. To inspire people to attend, Constanze, one of the jury members, even wrote a poem.

We received many applications and shortlisted applicants based on their motivation - ensuring we have a good mix of people from varied backgrounds.

What happened

Photo of Stroopwaffels

On the rainy weekend of 12-13 October, we kicked off the IoT hackathon at the Postillion Convention Centre WTC in Rotterdam. Both days kicked off with strong coffee, hackathon t-shirts and many tins of Dutch 'stroopwafels', which have become a part of the RIPE NCC hackathon tradition.

Before the hackathon, we asked participants to suggest projects that they would like to work on. We received 22 proposals (!) ranging from merging RIPE Atlas with Klimerko, a monitoring air quality device, to creating a tool that easily monitors malicious traffic inside a local network (behind the NAT).

We discussed all the ideas on the first morning. It was great to see how quickly the participants and the individual ideas ended being grouped naturally into four projects. Each project was later assessed by our jury. The projects were (click on the names to see more details):

The team’s focus was on finding methods to identify network anomalies by analysing network traffic patterns of IoT devices.

 Photo of team PRAVAG

Anna, Antonios, Grissel, Peter, Petros, Robert and Vasileios from Team PRAVAG

Your home has a number of connected devices such as a smart TV or an IP Camera. The proposed solution intended to help determine whether or not these devices are being used by an attacker as a Botnet. A common example where such a solution would have been beneficial is the Mirai Botnet attack. The team divided themselves to work on three different tasks:

  1. Data processing
  2. Data visualising
  3. Anomaly detection

They validated the approach by feeding a historic data set of real IoT traffic, provided by one of the team members, into existing professional tools for data processing. Then, they derived patterns of what is normal and namely in the existing datasets. At the end of the hackathon, they provided us with a proof of concept to detect malicious device behaviour to prevent or stop such as DDoS attacks.

The software they used was luminol and phrophet for comparing packet data to find unusal behaviour patterns.

Looking into the future, these findings could be fed to AI for anomaly detection. The team intends to continue their work will also have to compare their efforts with existing work such as SPIN. Incidentally, one of the team's members is actually working on this topic for her thesis.

Team Maria worked on adding the RIPE Atlas probe functionality to a TTN LoRaWAN Gateway and Raspberry Pi (RPi) in general.

Photo of Team Maria participants

Anup, Vladislav, Cristel, Marco, Philip and Randy from Team Maria

LoRawAN gateways are expensive. Using an RPi as the LoRaWAN gateway reduces cost for DIY users. Also, adding RIPE Atlas network measurements and monitoring capacities to an RPI helps leverage existing devices and thus helps benefit research users.

This can be used in all IoT scenarios in which the unlicensed band technology “LoRa” is being used for long-range, low data rate communication. The RPi can be deployed as a LoRaWAN gateway while serving as a RIPE Atlas probe, especially in developing countries where unlicensed spectrum deployment is preferred due to its low-cost and easy deployment.

During the hackathon, team Maria was able to port the RIPE Atlas to the RPi running Raspbian/Buster, and also older versions of Raspbian. They also managed to port that to the LoRa platform, which might lead to back-porting to Raspbian/Debian jessie. By the end of the hackathon, full Debian packages were available.

In the future, the packaging will enable all users to easily install the necessary software to integrate RIPE Atlas to an RPi. This work could be taken further by others by preparing similar packages for other distributions such as FreeBSD, CentOS etc. In addition to the RPi use case, the same principles could be applied in data centre networks on already installed servers.

The software they used to install the gateway on the IMST hardware can be found at: http://www.technoblogy.com/show?1XKI

This team worked on disseminating and authenticating official warnings or alerts in fragmented networks, where users have intermittent or no access to the broader global Internet.

 Photo of team Survival Layer participants

Arman, Demian, Desiree, Pouyan, Renan and Tasos from Team Survival Layer

The current state of IP networks requires clients to know the location, i.e. IP address, of the desired data before fetching that. However, sometimes known hosts are not reachable due to network fragmentation or the client is not aware of the responsible hosts.

The aim of the project was to solve this problem through Information Centric Networking (ICN). In ICN, data is spatiotemporally decoupled from its producer and is identifiable solely by its name throughout the network. Such decoupling brings about advantages such as in-network caching and allows data to be mulled to the fragmented network without having to requiring access to its original producer. At the same time consumers retrieve data by its name without needing to know where it is stored. The ICN paradigm simplifies the networking stack because higher-layer services that we know from the current Internet are native on the network layer in ICN.

This functionality can be used shortly after a disaster of crises, therefore the name “Survival Layer”. In such a scenario, where the network is fragmented and civilians have no access to the broader global Internet, a drone could fly over isolated neighbourhoods and disseminate alerts, warnings, and other informative material. These are cached by a local ICN node and can be retrieved by the civilians, i.e. consumers.

At the hackathon, the team presented a basic dissemination scenario. In the future, they will be looking into addressing the problem of authentication.

Team Aethernauts’s project was inspired by a real use-case from the Deutsche Bahn! They wanted to use real low-end simple microcontrollers to test the Quality of Service (QoS) of users connected to their WiFi. To do so, they coded a WLAN probe to measure WLAN performance indicators. This can be used anywhere where a reliable measurement of a WLAN infrastructure is required. Photo of team Aethernauts participants

 Christop, Craig, Michael and Cristian from Team Aethernauts

This project was actually initiated before the IoT Hackathon and the team arrived with several hundred lines code already in place! The team had two goals for the hackathon:

  1. To visualise incoming data with Grafana, because until then, the probes were pumping data only to a MQTT broker. During the hackathon, they achieved this goal.
  2. To refactor the existing code to enhance its capabilities to grow. This was harder to measure but they implemented the first tests and introduced a new way to handle measurement results in the code. The refactoring was not completed but they will keep developing it. They learned a lot about the importance of tested code and how much effort one needs to put into a smooth setup, especially with multiple hardware and software components.

To test this functionality, they used MicroPython on a ESP32.

This work will be continued by the team member from Deutsche Bahn. This is a classical case where the WiFi service provider wants to know the QoS provided by using cheap microcontrollers.

Conclusion and Next Steps

At the end of the hackathon the projects were awarded based on their efforts and contribution.
The jury decided not to select one winning team but to award each team for their specific skills and effort:
  • Best Interdisciplancy Work - Team PRAVAG
  • Most Technology Layers - Aethernauts
  • Most Post-Apocalyptic Project - Survival Layer
  • Most Complete Project - Maria

The winning teams were awarded with RIPE Atlas credits, free tickets to the The Things Conference and the opportunity to attend RIPE 80 for free and present their follow-up work. Most importantly, they were awarded with chocolates!

To celebrate two successful days of IoT hacking, we took a water taxi to the local Hackerspace, PixelBar. In case you haven't heard of them, hackerspaces are places around the world that allow people to tinker in technology and to work on projects, connect with communities and learn from each other.

We want to thank all our participants for attending, as well as the organising team and jury. The materials used during the IoT Hackathon can be found on GitHub.

If you would like to take part in one of our next hackathons, keep an eye on RIPE Labs.

Additional Resources

Documentary – “Smart City. In search of the Smart Citizen”

You may also like

View more

About the author

Vesna Manojlovic is Community Builder at RIPE NCC. Vesna joined the RIPE NCC as a Trainer in 1999. In 2003, she took responsibility for developing and delivering advanced courses, such as RPSL, Routing Registry, DNSSEC and IPv6. In 2008, she lead efforts to establish IPv6 RIPEness as a measure of IPv6 deployment among LIRs. In 2011, she joined the Science Division as Manager of the Measurements Community Building team; in 2015 she moved to Communications Department as Senior Community Builder, with a focus on organising hackathons. Vesna gives presentations at many technical conferences and workshops, and enjoys visiting hackerspaces. Vesna received a Batchelor of Sciences Degree in Computer Science and Informatics from the School of Electrical Engineering, University of Belgrade. She has three children.

Comments 0