This file was created by the TYPO3 extension
bib
--- Timezone: UTC
Creation date: 2025-01-19
Creation time: 20-18-43
--- Number of references
3
inproceedings
2024-buildsys-breyer-waterreview
A Critical Review of Household Water Datasets
2024
11
6
318-322
www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-breyer-waterreview.pdf
Online
ACM
Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou, China
en
979-8-4007-0706-3/24/11
10.1145/3671127.3698793
1
JustusBreyer
MaximilianPetri
Muhammad HamadAlizai
KlausWehrle
inproceedings
2024-buildsys-breyer-transferstudy
Investigating Domain Bias in NILM
2024
11
6
333-336
www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-breyer-transferstudy.pdf
Online
ACM
Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou, China
en
979-8-4007-0706-3/24/11
10.1145/3671127.3699532
1
JustusBreyer
SparshJauhari
RenéGlebke
Muhammad HamadAlizai
MarkusStroot
KlausWehrle
article
2024_pennekamp_supply-chain-sensing
Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs
IEEE Access
2024
1
8
12
9350-9368
Supply chains increasingly develop toward complex networks, both technically in terms of devices and connectivity, and also anthropogenic with a growing number of actors. The lack of mutual trust in such networks results in challenges that are exacerbated by stringent requirements for shipping conditions or quality, and where actors may attempt to reduce costs or cover up incidents. In this paper, we develop and comprehensively study four scenarios that eventually lead to end-to-end-secured sensing in complex IoT-based supply chains with many mutually distrusting actors, while highlighting relevant pitfalls and challenges—details that are still missing in related work. Our designs ensure that sensed data is securely transmitted and stored, and can be verified by all parties. To prove practical feasibility, we evaluate the most elaborate design with regard to performance, cost, deployment, and also trust implications on the basis of prevalent (mis)use cases. Our work enables a notion of secure end-to-end sensing with minimal trust across the system stack, even for complex and opaque supply chain networks.
blockchain technology; reliability; security; trust management; trusted computing; trusted execution environments
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-secure-sensing.pdf
2169-3536
10.1109/ACCESS.2024.3350778
1
JanPennekamp
FritzAlder
LennartBader
GianlucaScopelliti
KlausWehrle
Jan TobiasMühlberg