% % This file was created by the TYPO3 extension % bib % --- Timezone: UTC % Creation date: 2024-12-03 % Creation time: 15-20-53 % --- Number of references % 143 % @Inproceedings { 2025_pennekamp_mapxchange, title = {MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps}, year = {2025}, month = {4}, keywords = {secure industrial collaboration; homomorphic encryption; data sharing; exchange platform; milling; process planning}, tags = {internet-of-production}, publisher = {ACM}, booktitle = {Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing (SAC '25), March 31-April 4, 2025, Sicily, Italy}, event_place = {Sicily, Italy}, event_name = {ACM/SIGAPP Symposium on Applied Computing}, event_date = {March 31-April 4, 2025}, state = {accepted}, reviewed = {1}, author = {Pennekamp, Jan and Leisten, Joseph and Weiler, Paul and Dahlmanns, Markus and Fey, Marcel and Brecher, Chrstian and Geisler, Sandra and Wehrle, Klaus} } @Article { 2024_querfurth_mcbert, title = {mcBERT: Patient-Level Single-cell Transcriptomics Data Representation}, journal = {bioRxiv}, year = {2024}, month = {11}, day = {7}, tags = {health}, DOI = {10.1101/2024.11.04.621897}, author = {von Querfurth, Benedikt and Lohm{\"o}ller, Johannes and Pennekamp, Jan and Bleckwehl, Tore and Kramann, Rafael and Wehrle, Klaus and Hayat, Sikander} } @Inproceedings { 2024-buildsys-breyer-waterreview, title = {A Critical Review of Household Water Datasets}, year = {2024}, month = {11}, day = {6}, pages = {318-322}, url = {www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-breyer-waterreview.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou, China}, language = {en}, ISBN = {979-8-4007-0706-3/24/11}, DOI = {10.1145/3671127.3698793}, reviewed = {1}, author = {Breyer, Justus and Petri, Maximilian and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { 2024-buildsys-breyer-transferstudy, title = {Investigating Domain Bias in NILM}, year = {2024}, month = {11}, day = {6}, pages = {333-336}, url = {www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-breyer-transferstudy.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou, China}, language = {en}, ISBN = {979-8-4007-0706-3/24/11}, DOI = {10.1145/3671127.3699532}, reviewed = {1}, author = {Breyer, Justus and Jauhari, Sparsh and Glebke, Ren{\'e} and Alizai, Muhammad Hamad and Stroot, Markus and Wehrle, Klaus} } @Inproceedings { 2024-saillard-exploring, title = {Exploring Anomaly Detection for Marine Radar Systems}, year = {2024}, month = {9}, abstract = {Marine radar systems are a core technical instrument for collision avoidance in shipping and an indispensable decision-making aid for navigators on the ship’s bridge in limited visibility conditions at sea, in straits, and harbors. While electromagnetic attacks against radars can be carried out externally, primarily by military actors, research has recently shown that marine radar is also vulnerable to attacks from cyberspace. These can be carried out internally, less “loudly”, and with significantly less effort and know-how, thus posing a general threat to the shipping industry, the global maritime transport system, and world trade. Based on cyberattacks discussed in the scientific community and a simulation environment for marine radar systems, we investigate in this work to which extent existing Intrusion Detection System (IDS) solutions can secure vessels’ radar systems, how effective their detection capability is, and where their limits lie. From this, we derive a research gap for radar-specific methods and present the first two approaches in that direction. Thus, we pave the way for necessary future developments of anomaly detection specific for marine navigation radars.}, keywords = {Marine Radar Systems, Maritime Cyber Security, Intrusion Detection Systems, Anomaly Detection, Navico BR24}, publisher = {Springer}, booktitle = {Proceedings of the 10th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS '24), co-located with the the 29th European Symposium on Research in Computer Security (ESORICS '24)}, event_place = {Bydgoszcz, Poland}, event_name = {10th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS 2024)}, event_date = {September 16-20, 2024}, state = {accepted}, language = {English}, reviewed = {1}, author = {Saillard, Antoine and Wolsing, Konrad and Wehrle, Klaus and Bauer, Jan} } @Inproceedings { 2024-wolsing-deployment, title = {Deployment Challenges of Industrial Intrusion Detection Systems}, year = {2024}, month = {9}, abstract = {With the escalating threats posed by cyberattacks on Industrial Control Systems (ICSs), the development of customized Industrial Intrusion Detection Systems (IIDSs) received significant attention in research. While existing literature proposes effective IIDS solutions evaluated in controlled environments, their deployment in real-world industrial settings poses several challenges. This paper highlights two critical yet often overlooked aspects that significantly impact their practical deployment, i.e., the need for sufficient amounts of data to train the IIDS models and the challenges associated with finding suitable hyperparameters, especially for IIDSs training only on genuine ICS data. Through empirical experiments conducted on multiple state-of-the-art IIDSs and diverse datasets, we establish the criticality of these issues in deploying IIDSs. Our findings show the necessity of extensive malicious training data for supervised IIDSs, which can be impractical considering the complexity of recording and labeling attacks in actual industrial environments. Furthermore, while other IIDSs circumvent the previous issue by requiring only benign training data, these can suffer from the difficulty of setting appropriate hyperparameters, which likewise can diminish their performance. By shedding light on these challenges, we aim to enhance the understanding of the limitations and considerations necessary for deploying effective cybersecurity solutions in ICSs, which might be one reason why IIDSs see few deployments.}, keywords = {Industrial Intrusion Detection Systems, Cyber-Physical Systems, Industrial Control Systems, Deployment}, web_url = {https://arxiv.org/pdf/2403.01809}, publisher = {Springer}, booktitle = {Proceedings of the 10th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS '24), co-located with the the 29th European Symposium on Research in Computer Security (ESORICS '24)}, event_place = {Bydgoszcz, Poland}, event_name = {10th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS 2024)}, event_date = {September 16-20, 2024}, state = {accepted}, language = {English}, reviewed = {1}, author = {Wolsing, Konrad and Wagner, Eric and Basels, Frederik and Wagner, Patrick and Wehrle, Klaus} } @Inproceedings { 2024-dahlmanns-cired, title = {Reliable and Secure Control Center to Station Device Communication}, year = {2024}, month = {6}, day = {19}, abstract = {The increasing demands on the power grid require intelligent and flexible solutions that ensure the grid's stability. Many of these measures involve sophisticated communication between the control center and the stations that is not efficiently realizable using traditional protocols, e.g., IEC 60870-5-104. To this end, IEC 61850 introduces data models which allow flexible communication. Still, the specification leaves open how DSOs should interconnect their stations to realize resilient communication between the control center and station devices. However, DSOs require such communication to adapt modern solutions increasing the grid's capacity, e.g., adaptive protection systems. In this paper, we present our envisioned network and communication concept for future DSO's ICT infrastructures that enables the control center to resiliently and flexibly communicate with station devices. For resilience, we suggest interconnecting each station with two distinct communication paths to the control center, use MPLS-TP and MPTCP for fast failovers when a single link fails, and mTLS to protect the communication possibilities against misuse. Additionally, in accordance with IEC 61850, we envision the control center to communicate with the station devices using MMS by using the station RTU as a proxy.}, tags = {ven2us}, booktitle = {Proceedings of the CIRED workshop on Increasing Distribution Network Hosting Capacity 2024, June 19-20, 2024, Vienna, Austria}, event_place = {Vienna}, event_name = {CIRED workshop on Increasing Distribution Network Hosting Capacity 2024}, event_date = {June 19-20, 2024}, DOI = {10.1049/icp.2024.2096}, reviewed = {1}, author = {Dahlmanns, Markus and Fink, Ina Berenice and Erichsen, Gerrit and Lin, Guosong and Hammer, Thomas and Borkenhagen, Burkhard and Schneider, Sebastian and Maahsen, Christof and Wehrle, Klaus} } @Inproceedings { 2024-kunze-spintrap, title = {SpinTrap: Catching Speeding QUIC Flows}, year = {2024}, month = {5}, day = {7}, tags = {legato}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-kunze-spintrap.pdf}, publisher = {IEEE/IFIP}, booktitle = {Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24)}, event_name = {2024 IEEE/IFIP Network Operations and Management Symposium}, DOI = {10.1109/NOMS59830.2024.10575719}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Tissen, Lars and Bode, Benedikt and Wehrle, Klaus} } @Incollection { 2024_pennekamp_blockchain-industry, title = {Blockchain Technology Accelerating Industry 4.0}, year = {2024}, month = {3}, day = {7}, volume = {105}, pages = {531-564}, abstract = {Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related processes. Here, blockchain technology emerges as a possible driver that satisfies demands even in settings with mutually distrustful stakeholders. We identify significant benefits achieved by blockchain technology for Industry 4.0 but also point out challenges and corresponding design options when applying blockchain technology in the industrial domain. Furthermore, we survey diverse industrial sectors to shed light on the current intersection between blockchain technology and industry, which provides the foundation for ongoing as well as upcoming research. As industrial blockchain applications are still in their infancy, we expect that new designs and concepts will develop gradually, creating both supporting tools and groundbreaking innovations.}, tags = {internet-of-production}, publisher = {Springer}, series = {Advances in Information Security}, chapter = {17}, booktitle = {Blockchains – A Handbook on Fundamentals, Platforms and Applications}, ISBN = {978-3-031-32145-0}, DOI = {10.1007/978-3-031-32146-7_17}, reviewed = {1}, author = {Pennekamp, Jan and Bader, Lennart and Wagner, Eric and Hiller, Jens and Matzutt, Roman and Wehrle, Klaus} } @Article { 2024_pennekamp_supply-chain-survey, title = {An Interdisciplinary Survey on Information Flows in Supply Chains}, journal = {ACM Computing Surveys}, year = {2024}, month = {2}, day = {1}, volume = {56}, number = {2}, abstract = {Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.}, keywords = {information flows; data communication; supply chain management; data security; data sharing; systematic literature review}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf}, publisher = {ACM}, ISSN = {0360-0300}, DOI = {10.1145/3606693}, reviewed = {1}, author = {Pennekamp, Jan and Matzutt, Roman and Klinkm{\"u}ller, Christopher and Bader, Lennart and Serror, Martin and Wagner, Eric and Malik, Sidra and Spi{\ss}, Maria and Rahn, Jessica and G{\"u}rpinar, Tan and Vlad, Eduard and Leemans, Sander J. J. and Kanhere, Salil S. and Stich, Volker and Wehrle, Klaus} } @Article { 2024_pennekamp_supply-chain-sensing, title = {Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs}, journal = {IEEE Access}, year = {2024}, month = {1}, day = {8}, volume = {12}, pages = {9350-9368}, abstract = {Supply chains increasingly develop toward complex networks, both technically in terms of devices and connectivity, and also anthropogenic with a growing number of actors. The lack of mutual trust in such networks results in challenges that are exacerbated by stringent requirements for shipping conditions or quality, and where actors may attempt to reduce costs or cover up incidents. In this paper, we develop and comprehensively study four scenarios that eventually lead to end-to-end-secured sensing in complex IoT-based supply chains with many mutually distrusting actors, while highlighting relevant pitfalls and challenges—details that are still missing in related work. Our designs ensure that sensed data is securely transmitted and stored, and can be verified by all parties. To prove practical feasibility, we evaluate the most elaborate design with regard to performance, cost, deployment, and also trust implications on the basis of prevalent (mis)use cases. Our work enables a notion of secure end-to-end sensing with minimal trust across the system stack, even for complex and opaque supply chain networks.}, keywords = {blockchain technology; reliability; security; trust management; trusted computing; trusted execution environments}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-secure-sensing.pdf}, ISSN = {2169-3536}, DOI = {10.1109/ACCESS.2024.3350778}, reviewed = {1}, author = {Pennekamp, Jan and Alder, Fritz and Bader, Lennart and Scopelliti, Gianluca and Wehrle, Klaus and M{\"u}hlberg, Jan Tobias} } @Inproceedings { 2024-basels-demo, title = {Demo: Maritime Radar Systems under Attack. Help is on the Way!}, year = {2024}, abstract = {For a long time, attacks on radar systems were limited to military targets. With increasing interconnection, cyber attacks have nowadays become a serious complementary threat also affecting civil radar systems for aviation traffic control or maritime navigation. Hence, operators need to be enabled to detect and respond to cyber attacks and must be supported by defense capabilities. However, security research in this domain is only just beginning and is hampered by a lack of adequate test and development environments. In this demo, we thus present a maritime Radar Cyber Security Lab (RCSL) as a holistic framework to identify vulnerabilities of navigation radars and to support the development of defensive solutions. RCSL offers an offensive tool for attacking navigation radars and a defensive module leveraging network-based anomaly detection. In our demonstration, we will showcase the radars’ vulnerabilities in a simulative environment and demonstrate the benefit of an application-specific Intrusion Detection System.}, publisher = {IEEE}, booktitle = {Proceedings of the 2023 IEEE 48th Conference on Local Computer Networks (LCN)}, event_place = {Caen, Normandy, France}, event_date = {October 8-10, 2024}, state = {accepted}, reviewed = {1}, author = {Basels, Frederik and Wolsing, Konrad and Padilla, Elmar and Bauer, Jan} } @Inproceedings { 2023_bader_reputation-systems, title = {Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation}, year = {2023}, month = {11}, day = {16}, pages = {464-475}, abstract = {Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volatile supply chain networks introduce, (2) give an overview of the diverse landscape of privacy-preserving reputation systems and their properties, and (3) based on well-established concepts from supply chain information systems and cryptography, we further propose an initial concept that accounts for the aforementioned challenges by utilizing fully homomorphic encryption. For future work, we identify the need of evaluating whether novel systems address the supply chain-specific privacy and confidentiality needs.}, note = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Volume 593}, keywords = {SCM; confidentiality; anonymity; voter; votee; FHE}, tags = {internet-of-production}, url = {https://jpennekamp.de/wp-content/papercite-data/pdf/bpt+23.pdf}, publisher = {Springer}, booktitle = {Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '23), November 14-17, 2023, Melbourne, VIC, Australia}, event_place = {Melbourne, VIC, Australia}, event_date = {November 14-17, 2023}, ISBN = {978-3-031-63988-3}, ISSN = {1867-8211}, DOI = {10.1007/978-3-031-63989-0_24}, reviewed = {1}, author = {Bader, Lennart and Pennekamp, Jan and Thevaraj, Emildeon and Spi{\ss}, Maria and Kanhere, Salil S. and Wehrle, Klaus} } @Article { 2023_lamberts_metrics-sok, title = {SoK: Evaluations in Industrial Intrusion Detection Research}, journal = {Journal of Systems Research}, year = {2023}, month = {10}, day = {31}, volume = {3}, number = {1}, abstract = {Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This huge momentum facilitates the exploration of diverse promising paths but likewise risks fragmenting the research landscape and burying promising progress. Consequently, it needs sound and comprehensible evaluations to mitigate this risk and catalyze efforts into sustainable scientific progress with real-world applicability. In this paper, we therefore systematically analyze the evaluation methodologies of this field to understand the current state of industrial intrusion detection research. Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences. While we observe an increased use of public datasets, publications still only evaluate 1.3 datasets on average, and frequently used benchmarking metrics are ambiguous. At the same time, the adoption of newly developed benchmarking metrics sees little advancement. Finally, our systematic analysis enables us to provide actionable recommendations for all actors involved and thus bring the entire research field forward.}, tags = {internet-of-production, rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-lamberts-metrics-sok.pdf}, publisher = {eScholarship Publishing}, ISSN = {2770-5501}, DOI = {10.5070/SR33162445}, reviewed = {1}, author = {Lamberts, Olav and Wolsing, Konrad and Wagner, Eric and Pennekamp, Jan and Bauer, Jan and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2023-sander-quic-ecn, title = {ECN with QUIC: Challenges in the Wild}, year = {2023}, month = {10}, tags = {legato}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-sander-quic-ecn.pdf}, web_url = {https://arxiv.org/abs/2309.14273}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '23)}, event_name = {Internet Measurement Conference 2023}, ISBN = {979-8-4007-0382-9/23/10}, DOI = {10.1145/3618257.3624821}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Bl{\"o}cher, Leo and Kosek, Mike and Wehrle, Klaus} } @Inproceedings { 2023-wagner-lcn-repel, title = {Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols}, year = {2023}, month = {10}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wagner-repel.pdf}, publisher = {IEEE}, booktitle = {48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US}, event_place = {Daytona Beach, Florida, US}, event_name = {IEEE Conference on Local Computer Networks (LCN)}, event_date = {Oktober 1-5, 2023}, state = {accepted}, language = {en}, reviewed = {1}, author = {Wagner, Eric and Rothaug, Nils and Wolsing, Konrad and Bader, Lennart and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2023-wolsing-xluuvlab, title = {XLab-UUV – A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles}, year = {2023}, month = {10}, abstract = {Roughly two-thirds of our planet is covered with water, and so far, the oceans have predominantly been used at their surface for the global transport of our goods and commodities. Today, there is a rising trend toward subsea infrastructures such as pipelines, telecommunication cables, or wind farms which demands potent vehicles for underwater work. To this end, a new generation of vehicles, large and Extra-Large Unmanned Underwater Vehicles (XLUUVs), is currently being engineered that allow for long-range, remotely controlled, and semi-autonomous missions in the deep sea. However, although these vehicles are already heavily developed and demand state-of-the-art communi- cation technologies to realize their autonomy, no dedicated test and development environments exist for research, e.g., to assess the implications on cybersecurity. Therefore, in this paper, we present XLab-UUV, a virtual testbed for XLUUVs that allows researchers to identify novel challenges, possible bottlenecks, or vulnerabilities, as well as to develop effective technologies, protocols, and procedures.}, keywords = {Maritime Simulation Environment, XLUUV, Cyber Range, Autonomous Shipping, Operational Technology}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wolsing-xluuvlab.pdf}, publisher = {IEEE}, booktitle = {1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS)}, event_place = {Daytona Beach, Florida, USA}, event_name = {1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS)}, event_date = {Oktober 1-5, 2023}, state = {accepted}, language = {en}, DOI = {10.1109/LCN58197.2023.10223405}, reviewed = {1}, author = {Wolsing, Konrad and Saillard, Antoine and Padilla, Elmar and Bauer, Jan} } @Inproceedings { 2023-bader-metrics, title = {METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks}, year = {2023}, month = {9}, day = {28}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bader-metrics.pdf}, booktitle = {Proceedings of the 9th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS '23), co-located with the the 28th European Symposium on Research in Computer Security (ESORICS '23)}, event_place = {The Hague, The Netherlands}, event_name = {9th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS '23)}, event_date = {September 28, 2023}, state = {accepted}, DOI = {10.1007/978-3-031-54204-6_2}, reviewed = {1}, author = {Bader, Lennart and Wagner, Eric and Henze, Martin and Serror, Martin} } @Inproceedings { 2023_bodenbenner_fairsensor, title = {FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization}, year = {2023}, month = {7}, day = {20}, abstract = {The long-term utility and reusability of measurement data from production processes depend on the appropriate contextualization of the measured values. These requirements further mandate that modifications to the context need to be recorded. To be (re-)used at all, the data must be easily findable in the first place, which requires arbitrary filtering and searching routines. Following the FAIR guiding principles, fostering findable, accessible, interoperable and reusable (FAIR) data, in this paper, the FAIR Sensor Ecosystem is proposed, which provides a contextualization middleware based on a unified data metamodel. All information and relations which might change over time are versioned and associated with temporal validity intervals to enable full reconstruction of a system's state at any point in time. A technical validation demonstrates the correctness of the FAIR Sensor Ecosystem, including its contextualization model and filtering techniques. State-of-the-art FAIRness assessment frameworks rate the proposed FAIR Sensor Ecosystem with an average FAIRness of 71\%. The obtained rating can be considered remarkable, as deductions mainly result from the lack of fully appropriate FAIRness metrics and the absence of relevant community standards for the domain of the manufacturing industry.}, keywords = {FAIR Data; Cyber-Physical Systems; Data Management; Data Contextualization; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bodenbenner-fair-ecosystem.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 21th IEEE International Conference on Industrial Informatics (INDIN '23), July 17-20, 2023, Lemgo, Germany}, event_place = {Lemgo, Germany}, event_date = {July 17-20, 2023}, ISBN = {978-1-6654-9313-0}, ISSN = {2378-363X}, DOI = {10.1109/INDIN51400.2023.10218149}, reviewed = {1}, author = {Bodenbenner, Matthias and Pennekamp, Jan and Montavon, Benjamin and Wehrle, Klaus and Schmitt, Robert H.} } @Inproceedings { 2023-schemmel-kdalloc-tool, title = {KDAlloc: The KLEE Deterministic Allocator: Deterministic Memory Allocation during Symbolic Execution and Test Case Replay}, year = {2023}, month = {7}, day = {13}, url = {https://dl.acm.org/doi/pdf/10.1145/3597926.3604921}, booktitle = {ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023)}, DOI = {10.1145/3597926.3604921}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Busse, Frank and Nowack, Martin and Cadar, Cristian} } @Article { Jakobs_2023_3, title = {Preserving the Royalty-Free Standards Ecosystem}, journal = {European Intellectual Property Review}, year = {2023}, month = {7}, volume = {45}, number = {7}, pages = {371-375}, abstract = {It has long been recognized in Europe and elsewhere that standards-development organizations (SDOs) may adopt policies that require their participants to license patents essential to the SDO’s standards (standards-essential patents or SEPs) to manufacturers of standardized products (“implementers”) on a royalty-free (RF) basis. This requirement contrasts with SDO policies that permit SEP holders to charge implementers monetary patent royalties, sometimes on terms that are specified as “fair, reasonable and nondiscriminatory” (FRAND). As demonstrated by two decades of intensive litigation around the world, FRAND royalties have given rise to intractable disputes regarding the manner in which such royalties should be calculated and adjudicated. In contrast, standards distributed on an RF basis are comparatively free from litigation and the attendant transaction costs. Accordingly, numerous SDOs around the world have adopted RF licensing policies and many widely adopted standards, including Bluetooth, USB, IPv6, HTTP, HTML and XML, are distributed on an RF basis. This note briefly discusses the commercial considerations surrounding RF standards, the relationship between RF standards and open source software (OSS) and the SDO policy mechanisms – including “universal reciprocity” -- that enable RF licensing to succeed in the marketplace.}, ISSN = {0142-0461}, DOI = {10.2139/ssrn.4235647}, reviewed = {1}, author = {Contreras, Jorge and Bekkers, Rudi and Biddle, Brad and Bonadio, Enrico and Carrier, Michael A. and Chao, Bernard and Duan, Charles and Gilbert, Richard and Henkel, Joachim and Hovenkamp, Erik and Husovec, Martin and Jakobs, Kai and Kim, Dong-hyu and Lemley, Mark A. and Love, Brian J. and McDonagh, Luke and Scott Morton, Fiona M. and Schultz, Jason and Simcoe, Timothy and Urban, Jennifer M. and Xiang, Joy Y} } @Incollection { 2023_rueppel_crd-b2.ii, title = {Model-Based Controlling Approaches for Manufacturing Processes}, year = {2023}, month = {2}, day = {8}, pages = {221-246}, abstract = {The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).}, keywords = {Process control; Model-based control; Data aggregation; Model identification; Model optimization}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_7}, reviewed = {1}, author = {R{\"u}ppel, Adrian Karl and Ay, Muzaffer and Biernat, Benedikt and Kunze, Ike and Landwehr, Markus and Mann, Samuel and Pennekamp, Jan and Rabe, Pascal and Sanders, Mark P. and Scheurenberg, Dominik and Schiller, Sven and Xi, Tiandong and Abel, Dirk and Bergs, Thomas and Brecher, Christian and Reisgen, Uwe and Schmitt, Robert H. and Wehrle, Klaus} } @Incollection { 2023_klugewilkes_crd-b2.iv, title = {Modular Control and Services to Operate Line-less Mobile Assembly Systems}, year = {2023}, month = {2}, day = {8}, pages = {303-328}, abstract = {The increasing product variability and lack of skilled workers demand for autonomous, flexible production. Since assembly is considered a main cost driver and accounts for a major part of production time, research focuses on new technologies in assembly. The paradigm of Line-less Mobile Assembly Systems (LMAS) provides a solution for the future of assembly by mobilizing all resources. Thus, dynamic product routes through spatiotemporally configured assembly stations on a shop floor free of fixed obstacles are enabled. In this chapter, we present research focal points on different levels of LMAS, starting with the macroscopic level of formation planning, followed by the mesoscopic level of mobile robot control and multipurpose input devices and the microscopic level of services, such as interpreting autonomous decisions and in-network computing. We provide cross-level data and knowledge transfer through a novel ontology-based knowledge management. Overall, our work contributes to future safe and predictable human-robot collaboration in dynamic LMAS stations based on accurate online formation and motion planning of mobile robots, novel human-machine interfaces and networking technologies, as well as trustworthy AI-based decisions.}, keywords = {Lineless mobile assembly systems (LMAS); Formation planning; Online motion planning; In-network computing; Interpretable AI; Human-machine collaboration; Ontology-based knowledge management}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-klugewilkes-iop-b2.iv.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_13}, reviewed = {1}, author = {Kluge-Wilkes, Aline and Baier, Ralph and Gossen, Daniel and Kunze, Ike and M{\"u}ller, Aleksandra and Shahidi, Amir and Wolfschl{\"a}ger, Dominik and Brecher, Christian and Corves, Burkhard and H{\"u}sing, Mathias and Nitsch, Verena and Schmitt, Robert H. and Wehrle, Klaus} } @Incollection { 2023_pennekamp_crd-a.i, title = {Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead}, year = {2023}, month = {2}, day = {8}, pages = {35-60}, abstract = {The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.}, keywords = {Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_2}, reviewed = {1}, author = {Pennekamp, Jan and Belova, Anastasiia and Bergs, Thomas and Bodenbenner, Matthias and B{\"u}hrig-Polaczek, Andreas and Dahlmanns, Markus and Kunze, Ike and Kr{\"o}ger, Moritz and Geisler, Sandra and Henze, Martin and L{\"u}tticke, Daniel and Montavon, Benjamin and Niemietz, Philipp and Ortjohann, Lucia and Rudack, Maximilian and Schmitt, Robert H. and Vroomen, Uwe and Wehrle, Klaus and Zeng, Michael} } @Inproceedings { 2023-lorz-cired, title = {Interconnected grid protection systems - reference grid for testing an adaptive protection scheme}, year = {2023}, pages = {3286-3290}, tags = {ven2us}, booktitle = {27th International Conference on Electricity Distribution (CIRED 2023), Rome, Italy, June 12-15, 2023}, event_place = {Rome, Italy}, event_name = {International Conference \& Exhibition on Electricity Distribution (CIRED)}, event_date = {June 12-15, 2023}, DOI = {10.1049/icp.2023.0864}, reviewed = {1}, author = {Lorz, Tobias and Jaeger, Johann and Selimaj, Antigona and Hacker, Immanuel and Ulbig, Andreas and Heckel, Jan-Peter and Becker, Christian and Dahlmanns, Markus and Fink, Ina Berenice and Wehrle, Klaus and Erichsen, Gerrit and Schindler, Michael and Luxenburger, Rainer and Lin, Guosong} } @Inproceedings { 2022-serror-ccs-inside, title = {Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring}, year = {2022}, month = {11}, day = {7}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-serror-ccs-inside.pdf}, publisher = {ACM}, howpublished = {online}, booktitle = {Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security}, event_place = {Los Angeles, CA, USA}, event_date = {November 8, 2022}, DOI = {10.1145/3548606.3563500}, reviewed = {1}, author = {Serror, Martin and Bader, Lennart and Henze, Martin and Schwarze, Arne and N{\"u}rnberger, Kai} } @Inproceedings { 2022-rechenberg-cim, title = {Guiding Ship Navigators through the Heavy Seas of Cyberattacks}, year = {2022}, month = {10}, keywords = {Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf}, web_url = {https://zenodo.org/record/7148794}, publisher = {Zenodo}, booktitle = {European Workshop on Maritime Systems Resilience and Security (MARESEC 2022)}, event_place = {Bremerhaven, Germany}, DOI = {10.5281/zenodo.7148794}, reviewed = {1}, author = {von Rechenberg, Merlin and R{\"o}{\ss}ler, Nina and Schmidt, Mari and Wolsing, Konrad and Motz, Florian and Bergmann, Michael and Padilla, Elmar and Bauer, Jan} } @Proceedings { 2022-wolsing-radarsec, title = {Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset}, year = {2022}, month = {9}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-radar.pdf}, publisher = {IEEE}, event_place = {Edmonton, Canada}, event_name = {47th IEEE Conference on Local Computer Networks (LCN)}, event_date = {September 26-29, 2022}, DOI = {10.1109/LCN53696.2022.9843801}, reviewed = {1}, author = {Wolsing, Konrad and Saillard, Antoine and Bauer, Jan and Wagner, Eric and van Sloun, Christian and Fink, Ina Berenice and Schmidt, Mari and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2022-schemmel-kdalloc, title = {A Deterministic Memory Allocator for Dynamic Symbolic Execution}, year = {2022}, month = {6}, tags = {safe}, url = {https://drops.dagstuhl.de/opus/volltexte/2022/16237/pdf/LIPIcs-ECOOP-2022-9.pdf}, booktitle = {European Conference on Object-Oriented Programming (ECOOP 2022)}, DOI = {10.4230/LIPIcs.ECOOP.2022.9}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Busse, Frank and Nowack, Martin and Cadar, Cristian} } @Inproceedings { 2022_dahlmanns_tlsiiot, title = {Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things}, year = {2022}, month = {5}, day = {31}, pages = {252-266}, abstract = {The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed to use TLS. To understand whether these changes indeed lead to secure Industrial Internet of Things deployments, i.e., using TLS-based protocols, which are configured according to security best practices, we perform an Internet-wide security assessment of ten industrial protocols covering the complete IPv4 address space. Our results show that both, retrofitted existing protocols and newly developed secure alternatives, are barely noticeable in the wild. While we find that new protocols have a higher TLS adoption rate than traditional protocols (7.2 \% vs. 0.4 \%), the overall adoption of TLS is comparably low (6.5 \% of hosts). Thus, most industrial deployments (934,736 hosts) are insecurely connected to the Internet. Furthermore, we identify that 42 \% of hosts with TLS support (26,665 hosts) show security deficits, e.g., missing access control. Finally, we show that support in configuring systems securely, e.g., via configuration templates, is promising to strengthen security.}, keywords = {industrial communication; network security; security configuration}, tags = {internet-of-production, rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-dahlmanns-asiaccs.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan}, event_place = {Nagasaki, Japan}, event_name = {ASIACCS '22}, event_date = {May 30-June 3, 2022}, ISBN = {978-1-4503-9140-5/22/05}, DOI = {10.1145/3488932.3497762}, reviewed = {1}, author = {Dahlmanns, Markus and Lohm{\"o}ller, Johannes and Pennekamp, Jan and Bodenhausen, J{\"o}rn and Wehrle, Klaus and Henze, Martin} } @Inproceedings { WagnerBH2022, title = {Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes}, year = {2022}, month = {5}, day = {18}, pages = {207-221}, url = {/fileadmin/papers/2022/2022-wagner-r2d2.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22)}, event_place = {San Antonio, Texas, USA}, event_name = {15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22)}, ISBN = {978-1-4503-9216-7/22/05}, DOI = {10.1145/3507657.3528539}, reviewed = {1}, author = {Wagner, Eric and Bauer, Jan and Henze, Martin} } @Inproceedings { 2022_wagner_ccchain, title = {Scalable and Privacy-Focused Company-Centric Supply Chain Management}, year = {2022}, month = {5}, day = {4}, abstract = {Blockchain technology promises to overcome trust and privacy concerns inherent to centralized information sharing. However, current decentralized supply chain management systems do either not meet privacy and scalability requirements or require a trustworthy consortium, which is challenging for increasingly dynamic supply chains with constantly changing participants. In this paper, we propose CCChain, a scalable and privacy-aware supply chain management system that stores all information locally to give companies complete sovereignty over who accesses their data. Still, tamper protection of all data through a permissionless blockchain enables on-demand tracking and tracing of products as well as reliable information sharing while affording the detection of data inconsistencies. Our evaluation confirms that CCChain offers superior scalability in comparison to alternatives while also enabling near real-time tracking and tracing for many, less complex products.}, keywords = {supply chain management; blockchain; permissionless; deployment; tracing and tracking; privacy}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wagner-ccchain.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China}, event_place = {Shanghai, China}, event_date = {May 2-5, 2022}, ISBN = {978-1-6654-9538-7/22}, DOI = {10.1109/ICBC54727.2022.9805503}, reviewed = {1}, author = {Wagner, Eric and Matzutt, Roman and Pennekamp, Jan and Bader, Lennart and Bajelidze, Irakli and Wehrle, Klaus and Henze, Martin} } @Article { 2022_brauner_iop, title = {A Computer Science Perspective on Digital Transformation in Production}, journal = {ACM Transactions on Internet of Things}, year = {2022}, month = {5}, day = {1}, volume = {3}, number = {2}, abstract = {The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.}, keywords = {Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf}, publisher = {ACM}, ISSN = {2691-1914}, DOI = {10.1145/3502265}, reviewed = {1}, author = {Brauner, Philipp and Dalibor, Manuela and Jarke, Matthias and Kunze, Ike and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Liebenberg, Martin and Michael, Judith and Pennekamp, Jan and Quix, Christoph and Rumpe, Bernhard and van der Aalst, Wil and Wehrle, Klaus and Wortmann, Andreas and Ziefle, Martina} } @Article { 2022-wolsing-aistracks, title = {Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches}, journal = {Journal of Marine Science and Engineering}, year = {2022}, month = {1}, day = {14}, volume = {10}, number = {1}, abstract = {The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, speed, and course of the sending vessels. AIS can thus serve as a tool to avoid collisions and increase onboard situational awareness. In recent years, AIS has been utilized in more and more applications since it enables worldwide surveillance of virtually any larger vessel and has the potential to greatly support vessel traffic services and collision risk assessment. Anomalies in AIS tracks can indicate events that are relevant in terms of safety and also security. With a plethora of accessible AIS data nowadays, there is a growing need for the automatic detection of anomalous AIS data. In this paper, we survey 44 research articles on anomaly detection of maritime AIS tracks. We identify the tackled AIS anomaly types, assess their potential use cases, and closely examine the landscape of recent AIS anomaly research as well as their limitations.}, keywords = {automatic identification system; AIS; anomaly detection; maritime safety; maritime security; maritime surveillance}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-aistracks.pdf}, web_url = {https://www.mdpi.com/2077-1312/10/1/112}, language = {en}, DOI = {10.3390/jmse10010112}, reviewed = {1}, author = {Wolsing, Konrad and Roepert, Linus and Bauer, Jan and Wehrle, Klaus} } @Inproceedings { 2022-lorenz-ven2us, title = {Interconnected network protection systems - the basis for the reliable and safe operation of distribution grids with a high penetration of renewable energies and electric vehicle}, year = {2022}, abstract = {Power grids are increasingly faced with the introduction of decentralized, highly volatile power supplies from renewable energies and high loads occurring from e-mobility. However, today’s static grid protection cannot manage all upcoming conditions while providing a high level of dependability and security. It forms a bottleneck of a future decarbonizing grid development. In our research project, we develop and verify an adaptive grid protection algorithm. It calculates situation dependent protection parameters for the event of power flow shifts and topology changes caused by volatile power supplies due to the increase of renewable generation and the rapid expansion of e-mobility. As a result the distribution grid can be operated with the optimally adapted protection parameters and functions for changing operating states. To safely adjust the values on protection hardware in the field, i.e., safe from hardware failures and cyberattacks, we research resilient and secure communication concepts for the adaptive and interconnected grid protection system. Finally, we validate our concept and system by demonstrations in the laboratory and field tests.}, tags = {ven2us}, booktitle = {Proceedings of the CIRED workshop on E-mobility and power distribution systems 2022, June 2-3, 2022, Porto, Portugal}, event_place = {Porto}, event_name = {CIRED workshop on E-mobility and power distribution systems 2022}, event_date = {June 2-3, 2022}, DOI = {10.1049/icp.2022.0768}, reviewed = {1}, author = {Lorenz, Matthias and Pletzer, Tobias Markus and Schuhmacher, Malte and Sowa, Torsten and Dahms, Michael and Stock, Simon and Babazadeh, Davood and Becker, Christian and Jaeger, Johann and Lorz, Tobias and Dahlmanns, Markus and Fink, Ina Berenice and Wehrle, Klaus and Ulbig, Andreas and Linnartz, Philipp and Selimaj, Antigona and Offergeld, Thomas} } @Inproceedings { 2021_pennekamp_laser, title = {Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use}, year = {2021}, month = {12}, day = {21}, abstract = {Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base. Background. As part of our collaborative research of advancing the scope of industrial applications through cybersecurity and privacy, we identified a set of common challenges and pitfalls that surface in such applied interdisciplinary collaborations. Aim. Our goal with this paper is to support researchers in the emerging field of cybersecurity in industrial settings by formalizing our experiences as reference for other research efforts, in industry and academia alike. Method. Based on our experience, we derived a process cycle of performing such interdisciplinary research, from the initial idea to the eventual dissemination and paper writing. This presented methodology strives to successfully bootstrap further research and to encourage further work in this emerging area. Results. Apart from our newly proposed process cycle, we report on our experiences and conduct a case study applying this methodology, raising awareness for challenges in cybersecurity research for industrial applications. We further detail the interplay between our process cycle and the data lifecycle in applied research data management. Finally, we augment our discussion with an industrial as well as an academic view on this research area and highlight that both areas still have to overcome significant challenges to sustainably and securely advance industrial applications. Conclusions. With our proposed process cycle for interdisciplinary research in the intersection of cybersecurity and industrial application, we provide a foundation for further research. We look forward to promising research initiatives, projects, and directions that emerge based on our methodological work.}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-laser-collaboration.pdf}, publisher = {ACSA}, booktitle = {Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), co-located with the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA}, event_place = {Austin, TX, USA}, event_name = {Learning from Authoritative Security Experiment Results (LASER '20)}, event_date = {December 8, 2020}, ISBN = {978-1-891562-81-5}, DOI = {10.14722/laser-acsac.2020.23088}, reviewed = {1}, author = {Pennekamp, Jan and Buchholz, Erik and Dahlmanns, Markus and Kunze, Ike and Braun, Stefan and Wagner, Eric and Brockmann, Matthias and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2021_kiesel_5g, title = {Development of a Model to Evaluate the Potential of 5G Technology for Latency-Critical Applications in Production}, year = {2021}, month = {12}, day = {15}, pages = {739-744}, abstract = {Latency-critical applications in production promise to be essential enablers for performance improvement in production. However, they require the right and often wireless communication system. 5G technology appears to be an effective way to achieve communication system for these applications. Its estimated economic benefit on production gross domestic product is immense ($740 billion Euro until 2030). However, 55\% of production companies state that 5G technology deployment is currently not a subject matter for them and mainly state the lack of knowledge on benefits as a reason. Currently, it is missing an approach or model for a use case specific, data-based evaluation of 5G technology influence on the performance of production applications. Therefore, this paper presents a model to evaluate the potential of 5G technology for latency-critical applications in production. First, we derive requirements for the model to fulfill the decision-makers' needs. Second, we analyze existing evaluation approaches regarding their fulfillment of the derived requirements. Third, based on outlined research gaps, we develop a model fulfilling the requirements. Fourth, we give an outlook for further research needs.}, keywords = {5G technology; latency-critical applications; production; evaluation model}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kiesel-5g-model.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 28th IEEE International Conference on Industrial Engineering and Engineering Management (IEEM '21), December 13-16, 2021, Singapore, Singapore}, event_place = {Singapore, Singapore}, event_date = {December 13-16, 2021}, ISBN = {978-1-6654-3771-4}, DOI = {10.1109/IEEM50564.2021.9673074}, reviewed = {1}, author = {Kiesel, Raphael and Boehm, Falk and Pennekamp, Jan and Schmitt, Robert H.} } @Inproceedings { 2021-hemminghaus-sigmar, title = {SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital Signatures}, year = {2021}, month = {11}, day = {25}, abstract = {Distributed maritime bridge systems are customary standard equipment on today’s commercial shipping and cruising vessels. The exchange of nautical data, e.g., geographical positions, is usually implemented using multicast network communication without security measures, which poses serious risks to the authenticity and integrity of transmitted data. In this paper, we introduce digital SIGnatures for MARitime systems (SIGMAR), a low-cost solution to seamlessly retrofit authentication of nautical data based on asymmetric cryptography. Extending the existing IEC 61162-450 protocol makes it is possible to build a backward-compatible authentication mechanism that prevents common cyber attacks. The development was successfully accompanied by permanent investigations in a bridge simulation environment, including a maritime cyber attack generator. We demonstrate SIGMAR’s feasibility by introducing a proof-of-concept implementation on low-cost and low-resource hardware and present a performance analysis of our approach.}, keywords = {Maritime Cyber Security;Authentication;Integrity;IEC 61162-450;NMEA 0183}, publisher = {IEEE}, booktitle = {In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)}, event_place = {Dubai, United Arab Emirates}, event_name = {International Symposium on Networks, Computers and Communications}, event_date = {31 Oct.-2 Nov. 2021}, DOI = {10.1109/ISNCC52172.2021.9615738}, reviewed = {1}, author = {Hemminghaus, Christian and Bauer, Jan and Wolsing, Konrad} } @Inproceedings { 2021-sander-shardingrevisited, title = {Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?}, year = {2021}, month = {11}, day = {2}, tags = {legato}, url = {/fileadmin/papers/2021/2021-sander-sharding-revisited.pdf}, web_url = {https://arxiv.org/abs/2110.14239}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '21)}, event_name = {Internet Measurement Conference 2021}, event_date = {02.11.21 - 04.11.21}, ISBN = {978-1-4503-9129-0/21/11}, DOI = {10.1145/3487552.3487832}, reviewed = {1}, author = {Sander, Constantin and Bl{\"o}cher, Leo and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021-kunze-signal-detection, title = {Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing}, year = {2021}, month = {6}, day = {10}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-signal-detection.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE)}, ISBN = {978-1-7281-9023-5}, ISSN = {2163-5145}, DOI = {10.1109/ISIE45552.2021.9576221}, reviewed = {1}, author = {Kunze, Ike and Niemietz, Philipp and Tirpitz, Liam and Glebke, Ren{\'e} and Trauth, Daniel and Bergs, Thomas and Wehrle, Klaus} } @Inproceedings { 2021_gleim_factstack, title = {FactStack: Interoperable Data Management and Preservation for the Web and Industry 4.0}, year = {2021}, month = {5}, day = {31}, volume = {P-312}, pages = {371-395}, abstract = {Data exchange throughout the supply chain is essential for the agile and adaptive manufacturing processes of Industry 4.0. As companies employ numerous, frequently mutually incompatible data management and preservation approaches, interorganizational data sharing and reuse regularly requires human interaction and is thus associated with high overhead costs. An interoperable system, supporting the unified management, preservation and exchange of data across organizational boundaries is missing to date. We propose FactStack, a unified approach to data management and preservation based upon a novel combination of existing Web-standards and tightly integrated with the HTTP protocol itself. Based on the FactDAG model, FactStack guides and supports the full data lifecycle in a FAIR and interoperable manner, independent of individual software solutions and backward-compatible with existing resource oriented architectures. We describe our reference implementation of the approach and evaluate its performance, showcasing scalability even to high-throughput applications. We analyze the system's applicability to industry using a representative real-world use case in aircraft manufacturing based on principal requirements identified in prior work. We conclude that FactStack fulfills all requirements and provides a promising solution for the on-demand integration of persistence and provenance into existing resource-oriented architectures, facilitating data management and preservation for the agile and interorganizational manufacturing processes of Industry 4.0. Through its open source distribution, it is readily available for adoption by the community, paving the way for improved utility and usability of data management and preservation in digital manufacturing and supply chains.}, note = {Lecture Notes in Informatics (LNI), Volume P-312}, keywords = {Web Technologies; Data Management; Memento; Persistence; PID; Industry 4.0}, tags = {internet-of-production}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2021/2021-gleim-btw-iop-interoperability-realization.pdf}, publisher = {Gesellschaft f{\"u}r Informatik}, booktitle = {Proceedings of the 19th Symposium for Database Systems for Business, Technology and Web (BTW '21), September 13-17, 2021, Dresden, Germany}, event_place = {Dresden, Germany}, event_date = {September 13-17, 2021}, ISBN = {978-3-88579-705-0}, ISSN = {1617-5468}, DOI = {10.18420/btw2021-20}, reviewed = {1}, author = {Gleim, Lars and Pennekamp, Jan and Tirpitz, Liam and Welten, Sascha and Brillowski, Florian and Decker, Stefan} } @Inproceedings { 2021-kunze-coordinate-transformation, title = {Investigating the Applicability of In-Network Computing to Industrial Scenarios}, year = {2021}, month = {5}, day = {11}, pages = {334-340}, keywords = {in-network computing; latency; approximation}, tags = {internet-of-production,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21)}, ISBN = {978-1-7281-6207-2}, DOI = {10.1109/ICPS49255.2021.9468247}, reviewed = {1}, author = {Kunze, Ike and Glebke, Ren{\'e} and Scheiper, Jan and Bodenbenner, Matthias and Schmitt, Robert H. and Wehrle, Klaus} } @Article { 2021_buckhorst_lmas, title = {Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production}, journal = {Procedia CIRP}, year = {2021}, month = {5}, day = {3}, volume = {99}, pages = {448-453}, abstract = {Assembly systems must provide maximum flexibility qualified by organization and technology to offer cost-compliant performance features to differentiate themselves from competitors in buyers' markets. By mobilization of multipurpose resources and dynamic planning, Line-less Mobile Assembly Systems (LMASs) offer organizational reconfigurability. By proposing a holarchy to combine LMASs with the concept of an Internet of Production (IoP), we enable LMASs to source valuable information from cross-level production networks, physical resources, software nodes, and data stores that are interconnected in an IoP. The presented holarchy provides a concept of how to address future challenges, meet the requirements of shorter lead times, and unique lifecycle support. The paper suggests an application of decision making, distributed sensor services, recommender-based data reduction, and in-network computing while considering safety and human usability alike.}, note = {Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME '20), July 14-17, 2020, Gulf of Naples, Italy}, keywords = {Internet of Production; Line-less Mobile Assembly System; Industrial Assembly; Smart Factory}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-buckhorst-holarchy.pdf}, publisher = {Elsevier}, event_place = {Gulf of Naples, Italy}, event_date = {July 14-17, 2020}, ISSN = {2212-8271}, DOI = {10.1016/j.procir.2021.03.064}, reviewed = {1}, author = {Buckhorst, Armin F. and Montavon, Benjamin and Wolfschl{\"a}ger, Dominik and Buchsbaum, Melanie and Shahidi, Amir and Petruck, Henning and Kunze, Ike and Pennekamp, Jan and Brecher, Christian and H{\"u}sing, Mathias and Corves, Burkhard and Nitsch, Verena and Wehrle, Klaus and Schmitt, Robert H.} } @Article { 2021_bader_privaccichain, title = {Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability}, journal = {Information Processing \& Management}, year = {2021}, month = {5}, day = {1}, volume = {58}, number = {3}, abstract = {The benefits of information sharing along supply chains are well known for improving productivity and reducing costs. However, with the shift towards more dynamic and flexible supply chains, privacy concerns severely challenge the required information retrieval. A lack of trust between the different involved stakeholders inhibits advanced, multi-hop information flows, as valuable information for tracking and tracing products and parts is either unavailable or only retained locally. Our extensive literature review of previous approaches shows that these needs for cross-company information retrieval are widely acknowledged, but related work currently only addresses them insufficiently. To overcome these concerns, we present PrivAccIChain, a secure, privacy-preserving architecture for improving the multi-hop information retrieval with stakeholder accountability along supply chains. To address use case-specific needs, we particularly introduce an adaptable configuration of transparency and data privacy within our design. Hence, we enable the benefits of information sharing as well as multi-hop tracking and tracing even in supply chains that include mutually distrusting stakeholders. We evaluate the performance of PrivAccIChain and demonstrate its real-world feasibility based on the information of a purchasable automobile, the e.GO Life. We further conduct an in-depth security analysis and propose tunable mitigations against common attacks. As such, we attest PrivAccIChain's practicability for information management even in complex supply chains with flexible and dynamic business relationships.}, keywords = {multi-hop collaboration; tracking and tracing; Internet of Production; e.GO; attribute-based encryption}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-bader-ipm-privaccichain.pdf}, publisher = {Elsevier}, ISSN = {0306-4573}, DOI = {10.1016/j.ipm.2021.102529}, reviewed = {1}, author = {Bader, Lennart and Pennekamp, Jan and Matzutt, Roman and Hedderich, David and Kowalski, Markus and Lücken, Volker and Wehrle, Klaus} } @Inproceedings { 2020_pennekamp_parameter_exchange, title = {Privacy-Preserving Production Process Parameter Exchange}, year = {2020}, month = {12}, day = {10}, pages = {510-525}, abstract = {Nowadays, collaborations between industrial companies always go hand in hand with trust issues, i.e., exchanging valuable production data entails the risk of improper use of potentially sensitive information. Therefore, companies hesitate to offer their production data, e.g., process parameters that would allow other companies to establish new production lines faster, against a quid pro quo. Nevertheless, the expected benefits of industrial collaboration, data exchanges, and the utilization of external knowledge are significant. In this paper, we introduce our Bloom filter-based Parameter Exchange (BPE), which enables companies to exchange process parameters privacy-preservingly. We demonstrate the applicability of our platform based on two distinct real-world use cases: injection molding and machine tools. We show that BPE is both scalable and deployable for different needs to foster industrial collaborations. Thereby, we reward data-providing companies with payments while preserving their valuable data and reducing the risks of data leakage.}, keywords = {secure industrial collaboration; Bloom filter; oblivious transfer; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-parameter-exchange.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA}, event_place = {Austin, TX, USA}, event_date = {December 7-11, 2020}, ISBN = {978-1-4503-8858-0/20/12}, DOI = {10.1145/3427228.3427248}, reviewed = {1}, author = {Pennekamp, Jan and Buchholz, Erik and Lockner, Yannik and Dahlmanns, Markus and Xi, Tiandong and Fey, Marcel and Brecher, Christian and Hopmann, Christian and Wehrle, Klaus} } @Inproceedings { 2020-henze-ccs-cybersecurity, title = {Poster: Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint}, year = {2020}, month = {11}, day = {9}, abstract = {Mitigating cybersecurity threats in power distribution grids requires a testbed for cybersecurity, e.g., to evaluate the (physical) impact of cyberattacks, generate datasets, test and validate security approaches, as well as train technical personnel. In this paper, we present a blueprint for such a testbed that relies on network emulation and power flow computation to couple real network applications with a simulated power grid. We discuss the benefits of our approach alongside preliminary results and various use cases for cybersecurity research and training for power distribution grids.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-henze-ccs-cybersecurity.pdf}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.}, event_place = {Virtual Event, USA}, event_date = {November 9-13, 2020}, DOI = {10.1145/3372297.3420016}, reviewed = {1}, author = {Henze, Martin and Bader, Lennart and Filter, Julian and Lamberts, Olav and Ofner, Simon and van der Velde, Dennis} } @Inproceedings { 2020_matzutt_anonboot, title = {Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services}, year = {2020}, month = {10}, day = {7}, pages = {531-542}, abstract = {Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrapping processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-colluding privacy peers. However, the typically small number of privacy peers enable single adversaries to mimic distributed services. We thus present AnonBoot, a Sybil-resistant medium to securely bootstrap distributed anonymity services via public blockchains. AnonBoot enforces that peers periodically create a small proof of work to refresh their eligibility for providing secure anonymity services. A pseudo-random, locally replicable bootstrapping process using on-chain entropy then prevents biasing the election of eligible peers. Our evaluation using Bitcoin as AnonBoot's underlying blockchain shows its feasibility to maintain a trustworthy repository of 1000 peers with only a small storage footprint while supporting arbitrarily large user bases on top of most blockchains.}, keywords = {anonymization; bootstrapping; public blockchain; Sybil attack; anonymity network; cryptocurrency tumbler; Bitcoin; Tor}, tags = {impact_digital; digital_campus}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-matzutt-anonboot.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS '20), October 5-9, 2020, Taipei, Taiwan}, event_place = {Taipei, Taiwan}, event_name = {ASIACCS 2020}, event_date = {October 5-9, 2020}, ISBN = {978-1-4503-6750-9/20/10}, DOI = {10.1145/3320269.3384729}, reviewed = {1}, author = {Matzutt, Roman and Pennekamp, Jan and Buchholz, Erik and Wehrle, Klaus} } @Article { 2020_niemietz_stamping, title = {Stamping Process Modelling in an Internet of Production}, journal = {Procedia Manufacturing}, year = {2020}, month = {7}, day = {11}, volume = {49}, pages = {61-68}, abstract = {Sharing data between companies throughout the supply chain is expected to be beneficial for product quality as well as for the economical savings in the manufacturing industry. To utilize the available data in the vision of an Internet of Production (IoP) a precise condition monitoring of manufacturing and production processes that facilitates the quantification of influences throughout the supply chain is inevitable. In this paper, we consider stamping processes in the context of an Internet of Production and the preliminaries for analytical models that utilize the ever-increasing available data. Three research objectives to cope with the amount of data and for a methodology to monitor, analyze and evaluate the influence of available data onto stamping processes have been identified: (i) State detection based on cyclic sensor signals, (ii) mapping of in- and output parameter variations onto process states, and (iii) models for edge and in-network computing approaches. After discussing state-of-the-art approaches to monitor stamping processes and the introduction of the fineblanking process as an exemplary stamping process, a research roadmap for an IoP enabling modeling framework is presented.}, note = {Proceedings of the 8th International Conference on Through-Life Engineering Service (TESConf '19), October 27-29, 2019, Cleveland, OH, USA}, keywords = {Stamping Process; Industry 4.0; Fine-blanking; Internet of production; Condition monitoring; Data analytics}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-niemietz-stamping-modelling.pdf}, publisher = {Elsevier}, event_place = {Cleveland, OH, USA}, event_date = {October 27-29, 2019}, ISSN = {2351-9789}, DOI = {10.1016/j.promfg.2020.06.012}, reviewed = {1}, author = {Niemietz, Philipp and Pennekamp, Jan and Kunze, Ike and Trauth, Daniel and Wehrle, Klaus and Bergs, Thomas} } @Inproceedings { 2020-schemmel-porse, title = {Symbolic Partial-Order Execution for Testing Multi-Threaded Programs}, year = {2020}, month = {7}, tags = {symbiosys}, url = {https://arxiv.org/pdf/2005.06688.pdf}, web_url2 = {https://arxiv.org/abs/2005.06688}, booktitle = {Computer Aided Verification (CAV 2020)}, event_name = {32nd International Conference on Computer Aided Verification}, DOI = {10.1007/978-3-030-53288-8_18}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Rodr{\'i}guez, C{\'e}sar and Laprell, David and Wehrle, Klaus} } @Inproceedings { 2020_pennekamp_supply_chain_accountability, title = {Private Multi-Hop Accountability for Supply Chains}, year = {2020}, month = {6}, day = {7}, abstract = {Today's supply chains are becoming increasingly flexible in nature. While adaptability is vastly increased, these more dynamic associations necessitate more extensive data sharing among different stakeholders while simultaneously overturning previously established levels of trust. Hence, manufacturers' demand to track goods and to investigate root causes of issues across their supply chains becomes more challenging to satisfy within these now untrusted environments. Complementarily, suppliers need to keep any data irrelevant to such routine checks secret to remain competitive. To bridge the needs of contractors and suppliers in increasingly flexible supply chains, we thus propose to establish a privacy-preserving and distributed multi-hop accountability log among the involved stakeholders based on Attribute-based Encryption and backed by a blockchain. Our large-scale feasibility study is motivated by a real-world manufacturing process, i.e., a fine blanking line, and reveals only modest costs for multi-hop tracing and tracking of goods.}, keywords = {supply chain; multi-hop tracking and tracing; blockchain; attribute-based encryption; Internet of Production}, tags = {internet-of-production}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-supply-chain-privacy.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops '20), 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS '20), June 7-11, 2020, Dublin, Ireland}, event_place = {Dublin, Ireland}, event_date = {June 7-11, 2020}, ISBN = {978-1-7281-7440-2}, ISSN = {2474-9133}, DOI = {10.1109/ICCWorkshops49005.2020.9145100}, reviewed = {1}, author = {Pennekamp, Jan and Bader, Lennart and Matzutt, Roman and Niemietz, Philipp and Trauth, Daniel and Henze, Martin and Bergs, Thomas and Wehrle, Klaus} } @Article { 2020_gleim_factDAG, title = {FactDAG: Formalizing Data Interoperability in an Internet of Production}, journal = {IEEE Internet of Things Journal}, year = {2020}, month = {4}, day = {14}, volume = {7}, number = {4}, pages = {3243-3253}, abstract = {In the production industry, the volume, variety and velocity of data as well as the number of deployed protocols increase exponentially due to the influences of IoT advances. While hundreds of isolated solutions exist to utilize this data, e.g., optimizing processes or monitoring machine conditions, the lack of a unified data handling and exchange mechanism hinders the implementation of approaches to improve the quality of decisions and processes in such an interconnected environment. The vision of an Internet of Production promises the establishment of a Worldwide Lab, where data from every process in the network can be utilized, even interorganizational and across domains. While numerous existing approaches consider interoperability from an interface and communication system perspective, fundamental questions of data and information interoperability remain insufficiently addressed. In this paper, we identify ten key issues, derived from three distinctive real-world use cases, that hinder large-scale data interoperability for industrial processes. Based on these issues we derive a set of five key requirements for future (IoT) data layers, building upon the FAIR data principles. We propose to address them by creating FactDAG, a conceptual data layer model for maintaining a provenance-based, directed acyclic graph of facts, inspired by successful distributed version-control and collaboration systems. Eventually, such a standardization should greatly shape the future of interoperability in an interconnected production industry.}, keywords = {Data Management; Data Versioning; Interoperability; Industrial Internet of Things; Worldwide Lab}, tags = {internet-of-production}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-iotj-iop-interoperability.pdf}, publisher = {IEEE}, ISSN = {2327-4662}, DOI = {10.1109/JIOT.2020.2966402}, reviewed = {1}, author = {Gleim, Lars and Pennekamp, Jan and Liebenberg, Martin and Buchsbaum, Melanie and Niemietz, Philipp and Knape, Simon and Epple, Alexander and Storms, Simon and Trauth, Daniel and Bergs, Thomas and Brecher, Christian and Decker, Stefan and Lakemeyer, Gerhard and Wehrle, Klaus} } @Article { 2020_mann_welding_layers, title = {Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers}, journal = {Advanced Structured Materials}, year = {2020}, month = {4}, day = {1}, volume = {125}, pages = {101-118}, abstract = {A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production.}, note = {Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19)}, keywords = {Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy}, tags = {Internet-of-Production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf}, publisher = {Springer}, event_place = {Ponta Delgada, Azores, Portugal}, event_date = {October 24-25, 2019}, ISBN = {978-981-15-2956-6}, ISSN = {1869-8433}, DOI = {10.1007/978-981-15-2957-3_8}, reviewed = {1}, author = {Mann, Samuel and Pennekamp, Jan and Brockhoff, Tobias and Farhang, Anahita and Pourbafrani, Mahsa and Oster, Lukas and Uysal, Merih Seran and Sharma, Rahul and Reisgen, Uwe and Wehrle, Klaus and van der Aalst, Wil} } @Inproceedings { 2020-kosek-tcp-conformance, title = {MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild}, year = {2020}, month = {3}, day = {30}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf}, web_url2 = {https://arxiv.org/abs/2002.05400}, publisher = {Springer}, booktitle = {Proceedings of the Passive and Active Measurement Conference (PAM '20)}, event_place = {Eugene, Oregon, USA}, event_name = {Passive and Active Measurement Conference (PAM 2020)}, event_date = {30.03.2020 - 31.03.2020}, language = {en}, DOI = {https://doi.org/10.1007/978-3-030-44081-7_8}, reviewed = {1}, author = {Kosek, Mike and Bl{\"o}cher, Leo and R{\"u}th, Jan and Zimmermann, Torsten and Hohlfeld, Oliver} } @Article { 2020-wehrle-digitalshadows, title = {Mit ''Digitalen Schatten'' Daten verdichten und darstellen : Der Exzellenzcluster ''Internet der Produktion'' forscht {\"u}ber die Produktionstechnik hinaus}, journal = {Der Profilbereich ''Information \& Communication Technology''}, year = {2020}, ISSN = {0179-079X}, DOI = {10.18154/RWTH-2021-02496}, author = {Jarke, Matthias and van der Aalst, Wil and Brecher, Christian and Brockmann, Matthias and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Rumpe, Bernhard and Schuh, G{\"u}nther and Wehrle, Klaus and Ziefle, Martina} } @Article { 2019-unterberg-matclass, title = {In-situ material classification in sheet-metal blanking using deep convolutional neural networks}, journal = {Production Engineering}, year = {2019}, month = {11}, day = {13}, volume = {13}, number = {6}, pages = {743-749}, keywords = {internet-of-production}, DOI = {10.1007/s11740-019-00928-w}, reviewed = {1}, author = {Unterberg, Martin and Niemietz, Phillip and Trauth, Daniel and Wehrle, Klaus and Bergs, Thomas} } @Inproceedings { 2019_pennekamp_dataflows, title = {Dataflow Challenges in an Internet of Production: A Security \& Privacy Perspective}, year = {2019}, month = {11}, day = {11}, pages = {27-38}, abstract = {The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in the area of manufacturing across institutional boundaries to realize benefits such as increased profit margins and product quality as well as reduced product development costs and time to market. This interconnection of CPS will lead to a plethora of new dataflows, especially between (partially) distrusting entities. In this paper, we identify and illustrate these envisioned inter-organizational dataflows and the participating entities alongside two real-world use cases from the production domain: a fine blanking line and a connected job shop. Our analysis allows us to identify distinct security and privacy demands and challenges for these new dataflows. As a foundation to address the resulting requirements, we provide a survey of promising technical building blocks to secure inter-organizational dataflows in an IoP and propose next steps for future research. Consequently, we move an important step forward to overcome security and privacy concerns as an obstacle for realizing the promised potentials in an Internet of Production.}, keywords = {Internet of Production; dataflows; Information Security}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-dataflows.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom}, event_place = {London, United Kingdom}, event_date = {November 11-15, 2019}, ISBN = {978-1-4503-6831-5/19/11}, DOI = {10.1145/3338499.3357357}, reviewed = {1}, author = {Pennekamp, Jan and Henze, Martin and Schmidt, Simo and Niemietz, Philipp and Fey, Marcel and Trauth, Daniel and Bergs, Thomas and Brecher, Christian and Wehrle, Klaus} } @Inproceedings { 2019_pennekamp_infrastructure, title = {Towards an Infrastructure Enabling the Internet of Production}, year = {2019}, month = {5}, day = {8}, pages = {31-37}, abstract = {New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.}, keywords = {Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW}, event_place = {Taipei, TW}, event_date = {May 6-9, 2019}, ISBN = {978-1-5386-8500-6/19}, DOI = {10.1109/ICPHYS.2019.8780276}, reviewed = {1}, author = {Pennekamp, Jan and Glebke, Ren{\'e} and Henze, Martin and Meisen, Tobias and Quix, Christoph and Hai, Rihan and Gleim, Lars and Niemietz, Philipp and Rudack, Maximilian and Knape, Simon and Epple, Alexander and Trauth, Daniel and Vroomen, Uwe and Bergs, Thomas and Brecher, Christian and B{\"u}hrig-Polaczek, Andreas and Jarke, Matthias and Wehrle, Klaus} } @Inproceedings { 2019-glebke-hicss-integrated, title = {A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems}, year = {2019}, month = {1}, day = {8}, pages = {7252-7261}, tags = {internet-of-production,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-integrated.pdf}, misc2 = {Online}, publisher = {University of Hawai'i at Manoa / AIS}, booktitle = {Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA}, language = {en}, ISBN = {978-0-9981331-2-6}, DOI = {10.24251/HICSS.2019.871}, reviewed = {1}, author = {Glebke, Ren{\'e} and Henze, Martin and Wehrle, Klaus and Niemietz, Philipp and Trauth, Daniel and Mattfeld, Patrick and Bergs, Thomas} } @Article { 2019_wehrle_dagstuhl_beginners, title = {The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research}, journal = {ACM SIGCOMM Computer Communication Review}, year = {2019}, month = {1}, volume = {49}, number = {1}, pages = {24-30}, abstract = {Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.}, ISSN = {0146-4833}, DOI = {10.1145/3314212.3314217}, author = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus} } @Inproceedings { 2018-bader-ethereum-car-insurance, title = {Smart Contract-based Car Insurance Policies}, year = {2018}, month = {12}, day = {9}, tags = {mynedata, internet-of-production, rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-bader-ethereum-car-insurance.pdf}, web_url = {https://ieeexplore.ieee.org/document/8644136}, publisher = {IEEE}, booktitle = {2018 IEEE Globecom Workshops (GC Wkshps)}, event_place = {Abu Dhabi, United Arab Emirates}, event_name = {1st International Workshop on Blockchain in IoT, co-located with IEEE Globecom 2018}, event_date = {2018-12-09}, DOI = {10.1109/GLOCOMW.2018.8644136}, reviewed = {1}, author = {Bader, Lennart and B{\"u}rger, Jens Christoph and Matzutt, Roman and Wehrle, Klaus} } @Inproceedings { 2018-cav-schemmel-liveness, title = {Symbolic Liveness Analysis of Real-World Software}, year = {2018}, month = {7}, day = {14}, tags = {symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-schemmel-symbolic-liveness-analysis-of-real-world-software.pdf}, booktitle = {Computer Aided Verification (CAV 2018)}, event_place = {Oxford, Great Britain}, event_name = {30th International Conference on Computer Aided Verification}, event_date = {2018-07-14 to 2018-07-17}, language = {en}, DOI = {10.1007/978-3-319-96142-2_27}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Soria Dustmann, Oscar and Noll, Thomas and Wehrle, Klaus} } @Inproceedings { 2018-hiller-ic2e-cpplintegration, title = {Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud}, year = {2018}, month = {4}, day = {19}, pages = {241-249}, tags = {ssiclops,iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf}, web_url = {https://ieeexplore.ieee.org/document/8360335}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA}, event_place = {Orlando, Florida, USA}, event_name = {2018 IEEE International Conference on Cloud Engineering (IC2E 2018)}, event_date = {2018-04-19}, ISBN = {978-1-5386-5008-0}, DOI = {10.1109/IC2E.2018.00050}, reviewed = {1}, author = {Hiller, Jens and Kimmerlin, Mael and Plauth, Max and Heikkila, Seppo and Klauck, Stefan and Lindfors, Ville and Eberhardt, Felix and Bursztynowski, Dariusz and Santos, Jesus Llorente and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2017-rueth-iwmeasure, title = {Large-Scale Scanning of TCP’s Initial Window}, year = {2017}, month = {11}, day = {1}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf}, publisher = {ACM}, booktitle = {In Proceedings of the Internet Measurement Conference (IMC '17)}, event_place = {London, UK}, event_name = {Proceedings of the 2017 Internet Measurement Conference}, event_date = {01.11.2017 - 03.11.2017}, language = {en}, DOI = {10.1145/3131365.3131370}, reviewed = {1}, author = {R{\"u}th, Jan and Bormann, Christian and Hohlfeld, Oliver} } @Inproceedings { 2017-stoffers-dsrt-memo-ident, title = {Automated Memoization: Automatically Identifying Memoization Units in Simulation Parameter Studies}, year = {2017}, month = {10}, day = {18}, pages = {33-42}, keywords = {Automatic Memoization; Accelerating Parameter Studies; Performance Prediction}, tags = {memosim,symbiosys}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-stoffers-dsrt-memo-ident.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 21st IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT 2017), Rome, Italy}, event_place = {Rome, Italy}, language = {en}, DOI = {10.1109/DISTRA.2017.8167664}, reviewed = {1}, author = {Stoffers, Mirko and Bettermann, Ralf and Wehrle, Klaus} } @Conference { 2017-fink-brainlab-gmds, title = {BrainLab - Ein Framework f{\"u}r mobile neurologische Untersuchungen}, year = {2017}, month = {8}, day = {29}, note = {Best Abstract Award}, web_url = {https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml}, web_url_date = {06.09.19}, publisher = {German Medical Science GMS Publishing House (2017)}, booktitle = {62. Jahrestagung der Deutschen Gesellschaft f{\"u}r Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS).}, event_place = {Oldenburg}, event_name = {GMDS 2017}, event_date = {17-21 September 2017}, DOI = {10.3205/17gmds137}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinski, Thomas and Titgemeyer, Yannic and Ramos, Roann and Kutafina, Ekaterina and Bitsch, J{\'o} Agila and Jonas, Stephan Michael} } @Proceedings { 2017-SymPerfPoster, title = {SymPerf: Predicting Network Function Performance}, year = {2017}, month = {8}, day = {21}, tags = {spp,erc,symbiosys,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf}, publisher = {ACM}, event_place = {Los Angeles, USA}, event_name = {ACM SIGCOMM 2017 Poster}, event_date = {21.8.2017 - 25.8.2017}, language = {en}, ISBN = {978-1-4503-5057-0/17/08}, DOI = {10.1145/3123878.3131977}, reviewed = {1}, author = {Rath, Felix and Krude, Johannes and R{\"u}th, Jan and Schemmel, Daniel and Hohlfeld, Oliver and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Article { dombrowski-vdi, title = {Funktechnologien f{\"u}r Industrie 4.0}, journal = {VDE Positionspapier}, year = {2017}, month = {6}, day = {1}, publisher = {VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.}, address = {Stresemannallee 15, 60596 Frankfurt am Main, Germany}, author = {Aktas, Ismet and Bentkus, Alexander and Bonanati, Florian and Dekorsy, Armin and Dombrowski, Christian and Doubrava, Michael and Golestani, Ali and Hofmann, Frank and Heidrich, Mike and Hiensch, Stefan and Kays, R{\"u}diger and Meyer, Michael and M{\"u}ller, Andreas and ten Brink, Stephan and Petreska, Neda and Popovic, Milan and Rauchhaupt, Lutz and Saad, Ahmad and Schotten, Hans and W{\"o}ste, Christoph and Wolff, Ingo} } @Conference { 2017-burgdorf-sleepylab, title = {SleepyLab: An extendable mobile sleeplab based on wearable sensors}, year = {2017}, month = {4}, day = {24}, pages = {1}, note = {abstract+poster}, url = {/fileadmin/papers/2017/2017-burgdorf-sleepylab-ifh17.pdf}, web_url2 = {http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf}, web_url2_date = {2017-05-09}, misc2 = {Online}, booktitle = {Informatics for Health 2017, Manchester UK}, event_place = {Manchester, UK}, event_name = {Informatics for Health 2017, Manchester UK}, event_date = {24-26 April 2017}, language = {en}, reviewed = {1}, author = {Burgdorf, Andreas and Bitsch Link, J{\'o} Agila and Jonas, Stephan} } @Conference { 2017-fink-brainlab, title = {BrainLab – towards mobile brain research}, year = {2017}, month = {4}, day = {24}, pages = {2}, url = {/fileadmin/papers/2017/2017-fink-brainlab.pdf}, web_url2 = {http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf}, web_url2_date = {2017-05-09}, misc2 = {Online}, booktitle = {Informatics for Health 2017, Manchester UK}, event_place = {Manchester, UK}, event_name = {Informatics for Health 2017, Manchester UK}, event_date = {24-26 April 2017}, language = {en}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinsky, Thomas and Ramos, Roann and Kutafina, Ekaterina and Bitsch Link, J{\'o} Agila and Jonas, Stephan} } @Phdthesis { bitsch-2017-enabling-dtn, title = {Enabling disruption tolerant services}, year = {2017}, month = {3}, day = {20}, volume = {14}, pages = {146}, keywords = {Disruption Tolerant Networking; Neighbor Discovery; Routing}, web_url = {https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-5164-3}, web_url_date = {2017-03-20}, misc = {Online, Print}, editor = {Klaus Wehrle}, publisher = {Shaker}, address = {Aachen, Germany}, series = {Reports on Communications and Distributed Systems}, school = {RWTH Aachen University}, institute = {Chair for Communication and Distributed Systems}, type = {Ph.D. Thesis}, language = {en}, ISBN = {978-3-8440-5164-3}, DOI = {10.2370/9783844051643}, reviewed = {1}, in_library = {1}, author = {Bitsch, J{\'o} Agila} } @Proceedings { 2017-serror-netsys-industrial, title = {Demo: A Realistic Use-case for Wireless Industrial Automation and Control}, year = {2017}, month = {3}, day = {16}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/Ansari_et_al_Wireless_Industrial_Automation_Demo_NetSys_2017.pdf}, publisher = {IEEE}, event_place = {G{\"o}ttingen, Germany}, event_name = {International Conference on Networked Systems (NetSys 2017)}, DOI = {10.1109/NetSys.2017.7931496}, reviewed = {1}, author = {Ansari, Junaid and Aktas, Ismet and Brecher, Christian and Pallasch, Christoph and Hoffmann, Nicolai and Obdenbusch, Markus and Serror, Martin and Wehrle, Klaus and Gross, James} } @Inproceedings { 2017-ziegeldorf-wons-tracemixer, title = {TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party}, year = {2017}, month = {2}, day = {21}, pages = {17-24}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-wons-tracemixer.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA}, language = {en}, ISBN = {978-3-901882-88-3}, DOI = {10.1109/WONS.2017.7888771}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Henze, Martin and Bavendiek, Jens and Wehrle, Klaus} } @Book { Jakobs_2017_1, title = {Digitalisation: Challenge and Opportunity for Standardisation. Proc. 22nd EURAS Annual Standardisation Conference}, year = {2017}, volume = {12}, misc2 = {Hiert gibt es keine Autoren, nur Herausgeber.}, editor = {Kai Jakobs, Knut Blind}, publisher = {Mainz Publishers}, series = {EURAS contributions to standardisation research,}, ISBN = {978-3-95886-172-5}, author = {Jakobs, Kai and Blind, Knut} } @Inproceedings { 2016-ahmed-sensys-poster-incremental, title = {Poster Abstract: Incremental Checkpointing for Interruptible Computations}, year = {2016}, month = {11}, day = {14}, pages = {1--2}, abstract = {We propose incremental checkpointing techniques enabling transiently powered devices to retain computational state across multiple activation cycles. As opposed to the existing approaches, which checkpoint complete program state, the proposed techniques keep track of modified RAM locations to incrementally update the retained state in secondary memory, significantly reducing checkpointing overhead both in terms of time and energy.}, url = {/fileadmin/misc/2016/2016-ahmed-sensys-poster-incremental.pdf}, web_url = {http://dl.acm.org/citation.cfm?id=2996701}, web_url_date = {2016-11-20}, web_url2 = {http://sensys.acm.org/2016/}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016), Stanford, CA, USA}, event_place = {Stanford, CA, USA}, event_name = {Sensys '16}, event_date = {November 14-16, 2016}, language = {en}, ISBN = {978-1-4503-4263-6/16/11}, DOI = {http://dx.doi.org/10.1145/2994551.2996701}, reviewed = {1}, author = {Ahmed, Saad and Khan, Hassan and Siddiqui, Junaid Haroon and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad} } @Inproceedings { 2016-ackermann-healthcom-eeg-emotion, title = {EEG-based Automatic Emotion Recognition: Feature Extraction, Selection and Classification Methods}, year = {2016}, month = {9}, day = {14}, pages = {159--164}, abstract = {Automatic emotion recognition is an interdisciplinary research field which deals with the algorithmic detection of human affect, e.g. anger or sadness, from a variety of sources, such as speech or facial gestures. Apart from the obvious usage for industry applications in human-robot interaction, acquiring the emotional state of a person automatically also is of great potential for the health domain, especially in psychology and psychiatry. Here, evaluation of human emotion is often done using oral feedback or questionnaires during doctor-patient sessions. However, this can be perceived as intrusive by the patient. Furthermore, the evaluation can only be done in a non-continuous manner, e.g. once a week during therapy sessions. In contrast, using automatic emotion detection, the affect state of a person can be evaluated in a continuous non-intrusive manner, for example to detect early on-sets of depression. An additional benefit of automatic emotion recognition is the objectivity of such an approach, which is not influenced by the perception of the patient and the doctor. To reach the goal of objectivity, it is important, that the source of the emotion is not easily manipulable, e.g. as in the speech modality. To circumvent this caveat, novel approaches in emotion detection research the potential of using physiological measures, such as galvanic skin sensors or pulse meters. In this paper we outline a way of detecting emotion from brain waves, i.e., EEG data. While EEG allows for a continuous, real-time automatic emotion recognition, it furthermore has the charm of measuring the affect close to the point of emergence: the brain. Using EEG data for emotion detection is nevertheless a challenging task: Which features, EEG channel locations and frequency bands are best suited for is an issue of ongoing research. In this paper we evaluate the use of state of the art feature extraction, feature selection and classification algorithms for EEG emotion classification using data from the de facto standard dataset, DEAP. Moreover, we present results that help choose methods to enhance classification performance while simultaneously reducing computational complexity.}, url = {/fileadmin/papers/2016/2016-ackermann-healthcom-emorec.pdf}, web_url2 = {http://ieeehealthcom2016.com/}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)}, event_place = {Munich, Germany}, event_name = {2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)}, event_date = {September 14-17, 2016}, language = {en}, ISBN = {978-1-5090-3370-6}, reviewed = {1}, author = {Ackermann, Pascal and Kohlschein, Christian and Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Jeschke, Sabina} } @Article { 2015-cheng-piap-jmu, title = {Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening}, journal = {JMIR Mhealth Uhealth}, year = {2016}, month = {7}, day = {20}, volume = {4}, number = {3}, pages = {e88}, tags = {piap}, web_url = {http://mhealth.jmir.org/2016/3/e88/}, web_url2 = {http://www.ncbi.nlm.nih.gov/pubmed/27439444}, misc2 = {Online}, language = {en}, ISSN = {2291-5222}, DOI = {10.2196/mhealth.5284}, reviewed = {1}, author = {Cheng, Paula Glenda Ferrer and Ramos, Roann Munoz and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael and Ix, Tim and See, Portia Lynn Quetulio and Wehrle, Klaus} } @Inproceedings { 2016-zimmermann-remp, title = {ReMP TCP: Low Latency Multipath TCP}, year = {2016}, month = {5}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia}, event_place = {Kuala Lumpur, Malaysia}, event_name = {ICC 2016}, event_date = {23.-27.5.2016}, ISBN = {978-1-4799-6664-6}, ISSN = {1938-1883}, DOI = {10.1109/ICC.2016.7510787}, reviewed = {1}, author = {Fr{\"o}mmgen, Alexander and Erbsh{\"a}user, Tobias and Zimmermann, Torsten and Wehrle, Klaus and Buchmann, Alejandro} } @Inproceedings { 2016-ramos-inpact-lexicon, title = {How Do I Say ''Sad?'' Building a Depression-Lexicon for Psychologist in a Pocket}, year = {2016}, month = {4}, day = {30}, pages = {1--6}, note = {29\% Acceptance rate}, url = {/fileadmin/misc/2016/2016-ramos-inpact-lexicon.pdf}, web_url2 = {http://inpact-psychologyconference.org/2016/conference-program/}, misc2 = {Online}, editor = {Clara Pracana and Michael Wang}, publisher = {World Institute for Advanced Research and Science}, address = {Lisbon, Portugal}, booktitle = {Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)}, event_place = {Lisbon, Portugal}, event_name = {International Psychological Applications Conference and Trends (InPACT 2016)}, event_date = {April 30 -- May 2, 2016}, language = {en}, ISBN = {978-989-99389-6-0}, reviewed = {1}, author = {Ramos, Roann Munoz and Cheng, Paula Glenda Ferrer and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael} } @Inproceedings { 2016-ramos-inpact-feeling-meh, title = {Feeling Meh: Psychologist in a pocket app for depression screening}, year = {2016}, month = {4}, day = {30}, pages = {1--4}, note = {29\% Acceptance rate}, url = {/fileadmin/misc/2016/2016-ramos-inpact-feeling-meh.pdf}, web_url2 = {http://inpact-psychologyconference.org/2016/conference-program/}, misc2 = {Online}, editor = {Clara Pracana and Michael Wang}, publisher = {World Institute for Advanced Research and Science}, address = {Lisbon, Portugal}, booktitle = {Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)}, event_place = {Lisbon, Portugal}, event_name = {International Psychological Applications Conference and Trends (InPACT 2016)}, event_date = {April 30 -- May 2, 2016}, language = {en}, ISBN = {978-989-99389-6-0}, reviewed = {1}, author = {Ramos, Roann Munoz and Cheng, Paula Glenda Ferrer and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael} } @Article { 2015-Jakobs-PIK, title = {YOLO oder die Kunst der Internet-Kommunikation}, journal = {PIK – Praxis der Informationsverarbeitung und Kommunikation}, year = {2016}, volume = {38}, number = {4}, pages = {129-133}, language = {DE}, ISSN = {1865-8342}, author = {Bolke-Hermanns, Helen and Jakobs, Kai} } @Article { 2016-sdnflex_si, title = {Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management}, journal = {Wiley Journal of Network Management}, year = {2016}, volume = {26}, number = {1}, url = {http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf}, author = {Hohlfeld, Oliver and Zinner, Thomas and Benson, Theophilus and Hausheer, David} } @Inproceedings { 2015-zimmermann-remp, title = {Remp TCP: Low latency Multipath TCP}, year = {2015}, month = {12}, day = {1}, publisher = {ACM}, booktitle = {Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany}, event_place = {Heidelberg, Germany}, event_name = {CoNEXT 2015}, event_date = {1.-4.12.2015}, reviewed = {1}, author = {Fr{\"o}mmgen, Alexander and Erbsh{\"a}user, Tobias and Zimmermann, Torsten and Wehrle, Klaus and Buchmann, Alejandro} } @Inproceedings { 2015-gerdes-authorization, title = {Autorisierungsmanagement f{\"u}r das Internet of Things}, year = {2015}, month = {9}, tags = {iotsec}, misc2 = {Online}, booktitle = {D•A•CH Security 2015}, event_place = {Sankt Augustin, Germany}, event_name = {D•A•CH Security 2015}, event_date = {08.09. - 09.09.2015}, state = {accepted}, language = {de}, reviewed = {1}, author = {Gerdes, Stefanie and Hummen, Ren{\'e} and Bergmann, Olaf} } @Inproceedings { 2015-bitsch-phealth-piap, title = {Psychologist in a Pocket: Towards Depression Screening on Mobile Phones}, year = {2015}, month = {6}, day = {2}, volume = {211}, pages = {153 --159}, abstract = {Depression is the most prevalent clinical disorder and one of the main causes of disability. This makes early detection of depressive symptoms critical in its prevention and management. This paper presents and discusses the development of Psychologist in a Pocket (PiaP), a mental mHealth application for Android which screens and monitors for these symptoms, and–given the explicit permission of the user–alerts a trusted contact such as the mental health professional or a close friend, if it detects symptoms. All text inputted electronically–such as short message services, emails, social network posts–is analyzed based on keywords related to depression based on DSM-5 and ICD criteria as well as Beck's Cognitive Theory of Depression and the Self-Focus Model. Data evaluation and collection happen in the background, on- device, without requiring any user involvement. Currently, the application is in an early prototype phase entering initial clinical validation.}, url = {fileadmin/papers/2015/2015-bitsch-phealth-piap.pdf}, misc = {Print}, editor = {Blobel, Bernd and Lind{\'e}n, Maria and Ahmed, Mobyen Uddin}, publisher = {IOS Press}, address = {Amsterdam}, series = {Studies in Health Technology and Informatics}, booktitle = {Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_place = {V{\"a}ster{\aa}s, Sweden}, event_name = {12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_date = {June 2-4, 2015}, language = {en}, ISBN = {978-1-61499-515-9}, ISSN = {0926-9630}, DOI = {10.3233/978-1-61499-516-6-153}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Ix, Tim and Ferrer Cheng, Paula Glenda and Wehrle, Klaus} } @Inproceedings { 2015-bitsch-phealth-brain, title = {Towards Brain Research in a Pocket: Bringing EEG Research and Diagnostics out of the Lab}, year = {2015}, month = {6}, day = {2}, volume = {211}, pages = {185 -- 190}, abstract = {Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment. We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach.}, url = {fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf}, misc = {Print}, editor = {Blobel, Bernd and Lind{\'e}n, Maria and Ahmed, Mobyen Uddin}, publisher = {IOS Press}, address = {Amsterdam}, series = {Studies in Health Technology and Informatics}, booktitle = {Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_place = {V{\"a}ster{\aa}s, Sweden}, event_name = {12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_date = {June 2-4, 2015}, language = {en}, ISBN = {978-1-61499-515-9}, ISSN = {0926-9630}, DOI = {10.3233/978-1-61499-516-6-185}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Severijns, Cassandra and Wehrle, Klaus} } @Proceedings { 2015-Jakobs-EURAS-Book, title = {The Role of Standards in Transatlantic Trade and Regulation. Proc. 20th EURAS Annual Standardisation Conference. EURAS contributions to standardisation research, vol. 9.}, year = {2015}, misc2 = {Online}, publisher = {Mainz Publishers}, ISBN = {978-3-95886-035-3}, reviewed = {1}, author = {Bergh Skriver, Katrine and Jakobs, Kai and Jerlang, Jesper} } @Conference { HohlfeldIMC, title = {A QoE Perspective on Sizing Network Buffers}, year = {2014}, month = {11}, booktitle = {ACM Internet Measurement Conference}, state = {accepted}, author = {Hohlfeld, Oliver and Pujol, Enric and Ciucu, Florin and Feldmann, Anja and Barford, Paul} } @Article { 2014-cheng-acta-geodyn-geomater, title = {Use of MEMS accelerometers/inclinometers as a geotechnical monitoring method for ground subsidence}, journal = {Acta Geodynamica et Geomaterialia}, year = {2014}, month = {10}, day = {8}, volume = {11}, number = {4}, pages = {1--12}, abstract = {Accelerometer and inclinometer are inertial sensors capable of measuring corresponding magnitude of Earth gravitational field along the direction of each axis. By means of rotation matrices related to inertial navigation methods, the output values of a three-dimensional accelerometer or a two-dimensional inclinometer can be transformed and processed into the azimuth and dip angle of the monitored target. With the rapid growth in development and cost reduction of Micro Electro Mechanical Systems (MEMS) and Wireless Sensor Network (WSN) in recent years, the engineers are able to carry out real-time wireless geotechnical monitoring during construction. In this paper, we set up a one-day measurement implemented by a self- developed wireless MEMS monitoring system on the surface in the construction site of South Hongmei Road super high way tunnel in Shanghai, by making use of rotation matrices in specific ways, the raw data are processed to expressions of three-dimensional normal vectors that represent the change of the ground. After unifying the vectors in the same coordinate system, we conduct a brief ground settlement analysis by means of an evaluation of the dip angles in the cross section and the azimuths of the sensor nodes.}, web_url = {http://www.irsm.cas.cz/index_en.php?page=acta_detail_doi\&id=96}, misc = {Online}, publisher = {Institute of Rock Structure and Mechanics of the ASCR, v.v.i.}, address = {Prague, Czech Republic}, howpublished = {Online}, language = {en}, ISSN = {2336-4351}, DOI = {10.13168/AGG.2014.0015}, reviewed = {1}, author = {Li, Cheng and Fern{\'a}ndez-Steeger, Tom{\'a}s and Bitsch Link, J{\'o} Agila and May, Matthias and Azzam, Rafig} } @Inproceedings { 2014-mass-wirtz-mafi, title = {High-performance, Energy-efficient Mobile Wireless Networking in 802.11 Infrastructure Mode}, year = {2014}, month = {10}, url = {fileadmin/papers/2014/2014-wirtz-mass-mafi.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, booktitle = {Proceedings of The 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014), Philadelphia, PA, USA}, event_place = {Philadelphia, USA}, event_name = {11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014)}, event_date = {27 - 30 October 2014}, language = {en}, ISBN = {978-1-4799-6035-4}, DOI = {10.1109/MASS.2014.21}, reviewed = {1}, author = {Wirtz, Hanno and Kunz, Georg and Laudenberg, Johannes and Backhaus, Robert and Wehrle, Klaus} } @Inproceedings { 2014-aasnet-henze-scslib, title = {SCSlib: Transparently Accessing Protected Sensor Data in the Cloud}, year = {2014}, month = {9}, day = {24}, volume = {37}, pages = {370-375}, tags = {sensorcloud}, url = {/fileadmin/papers/2014/2014-henze-aasnet-scslib.pdf}, misc2 = {Online}, publisher = {Elsevier}, series = {Procedia Computer Science}, booktitle = {The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada}, event_place = {Halifax, NS, Canada}, event_name = {The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14)}, language = {en}, DOI = {10.1016/j.procs.2014.08.055}, reviewed = {1}, author = {Henze, Martin and Bereda, Sebastian and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2014-chants-wirtz-disco, title = {Opportunistic Interaction in the Challenged Internet of Things}, year = {2014}, month = {9}, day = {7}, pages = {1-8}, url = {fileadmin/papers/2014/2014-wirtz-chants-challenged_iot.pdf}, misc2 = {online}, publisher = {ACM}, booktitle = {Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, USA}, event_place = {Maui, Hawaii, USA}, event_name = {Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014)}, event_date = {7 September 2014}, language = {en}, ISBN = {978-1-4503-3071-8}, DOI = {10.1145/2645672.2645679}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Serror, Martin and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2014-stoffers-omnet-parallel-inet, title = {Enabling Distributed Simulation of OMNeT++ INET Models}, year = {2014}, month = {9}, day = {3}, url = {http://arxiv.org/pdf/1409.0994}, misc = {arXiv:1409.0994}, misc2 = {Online}, publisher = {Cornell University}, address = {Ithaca, New York, United States}, booktitle = {Proceedings of the 1st OMNeT++ Community Summit, Hamburg, Germany}, event_place = {Hamburg, Germany}, language = {en}, author = {Stoffers, Mirko and Bettermann, Ralf and Gross, James and Wehrle, Klaus} } @Inproceedings { 2014-bitsch-extremecom-demo, title = {Demo: Opportunistic Mobile Brain Research}, year = {2014}, month = {8}, day = {14}, pages = {1--2}, abstract = {The majority of research using brain imaging and EEG techniques is currently limited to clinical environments, restricting experiments to synthetic tasks in controlled conditions. Lifting these limitations brought about by this artificial set-up would allow us to perform neuropsychological assessments and research in mobile settings or at locations easier accessible to patients, possibly even in remote, hard to access areas. We developed a tablet based mobile framework to present auditory and visual stimuli, capture wireless commercial EEG and screen interaction data, and analyze the recorded data for immediate evaluation, as well as share the data over internet or local opportunistic links. To demonstrate the feasibility of our approach, we successfully replicated the experimental set-up and evaluation pipeline of two existing EEG studies on event-related potentials. This work therefore lays the foundation to further truly mobile brain research and health-care applications.}, url = {fileadmin/papers/2014/2014-bitsch-extremcom-mobile-eeg-demo.pdf}, misc = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 6th Extreme Conference on Communication}, event_place = {Galapagos Islands, Ecuador}, event_name = {6th Extreme Conference on Communication}, event_date = {August 11-15, 2014}, language = {en}, ISBN = {978-1-4503-2929-3}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Orlea, David and Wehrle, Klaus} } @Inproceedings { 2014-bitsch-extremecom-liquid-democracy, title = {WIP: Opportunistic Vote Delegation for e-Voting based on Liquid Democracy}, year = {2014}, month = {8}, day = {14}, pages = {1--4}, note = {Work in Progress Paper}, url = {fileadmin/papers/2014/2014-bitsch-extremecom-liquid-democracy.pdf}, misc = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 6th Extreme Conference on Communication}, event_place = {Galapagos Islands, Ecuador}, event_name = {6th Extreme Conference on Communication}, event_date = {August 11-15, 2014}, language = {en}, ISBN = {978-1-4503-2929-3}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Tchorbadjiiski, Angel and Wehrle, Klaus} } @Inproceedings { 2013-wintech-bosling-models, title = {Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {30}, pages = {65--72}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-bosling-wintech-fingerprint.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)}, event_date = {30 September 2013}, language = {en}, DOI = {10.1145/2505469.2505477}, reviewed = {1}, author = {Bosling, Marcel and Ceriotti, Matteo and Zimmermann, Torsten and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2013-smith-extremecom-demo, title = {Demo: Opportunistic Deployment Support for Wireless Sensor Networks}, year = {2013}, month = {8}, day = {24}, pages = {1--2}, note = {won ''coolest demo award''}, url = {fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf}, misc = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 5th Extreme Conference on Communication}, event_place = {Thorsmork, Iceland}, event_name = {5th Extreme Conference on Communication}, event_date = {August 24-30, 2013}, language = {en}, ISBN = {978-1-4503-2171-6}, reviewed = {1}, author = {Smith, Paul and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2013-bitsch-extremecom-oneway, title = {A Global One-Way Control Channel for Opportunistic Networks}, year = {2013}, month = {8}, day = {24}, pages = {1--6}, url = {fileadmin/papers/2013/2013-bitsch-extremecom-oneway.pdf}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 5th Extreme Conference on Communication}, event_place = {Thorsmork, Iceland}, event_name = {5th Extreme Conference on Communication}, event_date = {August 24-30, 2013}, language = {en}, ISBN = {978-1-4503-2171-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Alhamoud, Alaa and Wehrle, Klaus} } @Article { 2013-fernandez-ceriotti-bitsch-and-then-the-weekend-jsan, title = {“And Then, the Weekend Started”: Story of a WSN Deployment on a Construction Site}, journal = {Journal of Sensor and Actuator Networks}, year = {2013}, month = {3}, day = {11}, volume = {2}, number = {1}, pages = {156--171}, abstract = {Wireless Sensor Networks (WSNs) are versatile monitoring systems that can provide a large amount of real-time data in scenarios where wired infrastructures are inapplicable or expensive. This technology is expected to be handled by domain experts, who perceive a WSN as a (promised to be) easy to deploy black box. This work presents the deployment experience of a WSN, as conducted by domain experts, in a ground improvement area. Building upon off-the-shelf solutions, a fuel cell powered gateway and 21 sensor devices measuring acceleration, inclination, temperature and barometric pressure were installed to monitor ground subsidence. We report about how poor GSM service, malfunctioning hardware, unknown communication patterns and obscure proprietary software required in-field ad-hoc solutions. Through the lessons learned, we look forward to investigating how to make the deployment of these systems an easier task.}, keywords = {sensor network deployment; experiences; in-field debugging}, web_url = {http://www.mdpi.com/2224-2708/2/1/156}, misc2 = {Online}, language = {en}, ISSN = {2224-2708}, DOI = {10.3390/jsan2010156}, reviewed = {1}, author = {Fern{\'a}ndez-Steeger, Tom{\'a}s and Ceriotti, Matteo and Bitsch Link, J{\'o} Agila and May, Matthias and Hentschel, Klaus and Wehrle, Klaus} } @Inproceedings { 2012-IPIN-Peter-Versatile-Maps, title = {Versatile Geo-referenced Maps for Indoor Navigation of Pedestrians}, year = {2012}, month = {11}, day = {13}, pages = {1--4}, url = {fileadmin/papers/2012/2012-bitsch-IPIN-vegemite.pdf}, web_url2 = {http://www.surveying.unsw.edu.au/ipin2012/proceedings/session.php?code=6C\&name=SLAM}, misc2 = {Online}, editor = {Li, Binghao Li and Gallagher, Thomas}, publisher = {School of Surveying and Geospatial Engineering, University of New South Wales, Sydney, Australia}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-0-646-57851-4}, reviewed = {1}, author = {Peter, Michael and Fritsch, Dieter and Sch{\"a}fer, Bernhardt and Kleusberg, Alfred and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2012-IPIN-Viol-HMM, title = {Hidden Markov Model-based 3D Path-matching using Raytracing-generated Wi-Fi Models}, year = {2012}, month = {11}, day = {13}, pages = {1--10}, url = {fileadmin/papers/2012/2012-11-viol-ipin.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6418873\&tag=1}, misc2 = {Online}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-1-4673-1955-3}, DOI = {10.1109/IPIN.2012.6418873}, reviewed = {1}, author = {Viol, Nicolai and Bitsch Link, J{\'o} Agila and Wirtz, Hanno and Rothe, Dirk and Wehrle, Klaus} } @Inproceedings { 2012-IPIN-Bitsch-FlowPath, title = {Indoor Navigation on Wheels (and on Foot) using Smartphones}, year = {2012}, month = {11}, day = {13}, pages = {10 S.}, url = {fileadmin/papers/2012/2012-bitsch-IPIN-navigation-on-wheels.pdf}, web_url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6418931}, misc2 = {Print}, address = {Piscataway, NJ, USA}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 11-13 November 2012 Sydney, Australia}, organization = {IEEE}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-1-4673-1955-3}, DOI = {10.1109/IPIN.2012.6418931}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Gerdsmeier, Felix and Smith, Paul and Wehrle, Klaus} } @Article { 2012-JLBS-Bitsch-FootPath, title = {Accurate Map-based Indoor Navigation on the Mobile}, journal = {Journal of Location Based Services}, year = {2012}, month = {7}, day = {11}, volume = {7}, number = {1}, pages = {23-43}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones, we accurately localise a user on her route and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, web_url = {http://www.tandfonline.com/doi/abs/10.1080/17489725.2012.692620}, misc2 = {Online}, publisher = {Taylor \& Francis}, address = {Bristol, PA, USA}, language = {en}, ISSN = {1748-9733}, DOI = {10.1080/17489725.2012.692620}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Viol, Nicolai and Wehrle, Klaus} } @Inproceedings { 2012-lora-mobiopp-Gossipmule:ScanningandDisseminatingInformationBetweenStationsinCooperativeWLANs, title = {Gossipmule: Scanning and Disseminating Information Between Stations in Cooperative WLANs (Poster)}, year = {2012}, month = {3}, day = {15}, pages = {87-88}, abstract = {In Cooperative WLAN scenarios, the lack of a centralized management, the existence of many administrative domains and the current association process in wireless networks make it difficult to guarantee the quality that users expect from services and networks. We present Gossipmule, an agent for wireless nodes that enhances the QoE perceived by users in Cooperative WLANs. Gossipmule uses mobile Crowdsensing between the wireless nodes to collect and disseminate information regarding the network. This information is used by the agent to have a more assertive association when making decisions regarding the user-AP association.}, note = {(Poster)}, url = {/fileadmin/papers/2012/2012-lora-MobiOpp12-Gossipmule.pdf}, web_url = {http://dl.acm.org/citation.cfm?id=2159576\&CFID=88550183\&CFTOKEN=31687193}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2012, Zurich, Switzerland}, event_place = {Zurich, Switzerland}, event_name = {Proceedings of the Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2012}, event_date = {2012-03-15}, language = {en}, ISBN = {978-1-4503-1208-0}, DOI = {10.1145/2159576.2159598}, reviewed = {1}, author = {Lora Gir{\'o}n, M{\'o}nica Alejandra and Paulus, Alexander and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2012-extremecom-goliath-adama, title = {A Versatile Architecture for DTN Services (Demo)}, year = {2012}, month = {3}, day = {10}, pages = {1--2}, abstract = {In this demo we present our architecture for delivering ap- plication services via Disruption or Delay Tolerant Networks (DTNs). The search for a killer application is still ongoing. Our architecture enables the community to quickly proto- type new services and test them in the real world, outside of simulators. Common tasks such as data transportation through the network is handled by the framework but can still be in uenced by the service, if required. A robust plu- gin architecture allows to deploy new applications and rout- ing schemes without a ecting stable-running services on the same network, even if the source of the new plugin is un- trusted.}, annotation = {Demo Abstract}, web_url = {http://extremecom2012.ee.ethz.ch/papers/7-extremecom2012-Goliath.pdf}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ETH Zurich}, address = {Zurich, Switzerland}, booktitle = {Proceedings of the 4th Extreme Conference on Communication}, event_place = {Zurich Switzerland}, event_name = {4th Extreme Conference on Communication}, event_date = {March 10-14, 2012}, language = {en}, reviewed = {1}, author = {Goliath, Andr{\'e} and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2012-wons-bosling-redmann-weingaertner, title = {Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?}, year = {2012}, month = {1}, day = {9}, pages = {131-134}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-students-6lowpan-wons2012.pdf}, web_url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6138950\#}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {Proceedings of the 9th International Conference on Wireless On-demand Network Systems and Services (WONS '12), Courmayeur, Italy}, event_place = {Courmayeur, Italy}, language = {en}, ISBN = {978-1-4577-1722-2}, DOI = {10.1109/WONS.2012.6152218}, reviewed = {1}, author = {Bosling, Marcel and Redmann, Torsten and Tekam, Jean and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { 2011-globecom-bitsch-geodtn, title = {geoDTN: Geographic Routing in Disruption Tolerant Networks}, year = {2011}, month = {12}, day = {5}, pages = {1 -- 5}, abstract = {In this paper we present a disruption tolerant routing algorithm based on geographic location information, which improves upon the hop count compared to the current state of the art by up to a factor of three in large scale human networks. Leveraging only the history of geographic movement patterns in the two-hop neighborhood, our algorithm is able to perform well in the absence of knowledge of social interaction between nodes and without detailed future schedule information. Representing previously visited locations as probability distributions encoded in an efficient vector, we formalize a heuristic for efficiently forwarding messages in disruption tolerant networks, implement a framework for comparing our approach with the state of the art, and evaluate key metrics, such as hop count and delivery rate, as well as energy consumption and battery depletion fairness on real world data. We are able to outperform the state of the art in human mobility based networks considerably in terms of energy usage per node, thereby extending data network availability further into areas devoid of otherwise necessary communication infrastructure.}, url = {fileadmin/papers/2011/2011-GlobeCom-bitsch-geoDTN.pdf}, misc2 = {Online}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Houston, Texas, USA}, organization = {IEEE}, event_place = {Houston, Texas, USA}, event_name = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN)}, event_date = {5-9 December 2011}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Schmitz, Daniel and Wehrle, Klaus} } @Inproceedings { 2011-extremecom-bitsch-neighbordiscovery, title = {Perfect Difference Sets for Neighbor Discovery}, year = {2011}, month = {9}, day = {26}, pages = {1--6}, abstract = {We present an energy efficient neighbor discovery framework that enables Linux and TinyOS based systems to discover and connect to neighbors via IEEE 802.11 and IEEE 802.15.4, which are only available sporadically. Using quorum schemes, we schedule on and off times of the wireless transmitters, to guarantee mutual discovery with minimum power given a specific latency requirement. Neighbor discovery is fundamental to intermittently connected networks, such as disruption and delay tolerant networks and optimizing it, can lead to significant overall energy savings. Using perfect difference sets, our results indicate that we reduce the latency by up to 10 times at a duty cycle of 2\% compared to the state of the art. We further define and characterize our neighbor discovery scheme with respect to fairness for asymmetric energy scenarios. Using these results, we allow energy-harvesting applications to adjust neighbor discovery based on their current energy requirements as a well defined trade-off.}, keywords = {Neighbor Discovery; Sporadic Connectivity; Wireless Networks}, url = {fileadmin/papers/2011/2011-ExtremeCom-bitsch-NeighborDiscovery.pdf}, web_url = {http://www.cl.cam.ac.uk/\verb=~=fb375/extremecom/2011/program.html}, web_url2 = {http://dl.acm.org/citation.cfm?id=2414398\&CFID=194814085\&CFTOKEN=73001357}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 3rd Extreme Conference of Communication (ExtremeCom 2011), Manaus, Brazil}, event_place = {Manaus, Brazil}, event_name = {ExtremeCom 2011}, event_date = {26-30 September 2011}, language = {en}, ISBN = {978-1-4503-1079-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Wollgarten, Christoph and Schupp, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-wirtz-chants, title = {Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode}, year = {2011}, month = {9}, day = {23}, url = {fileadmin/papers/2011/2011-wirtz-chants.pdf}, misc = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the ACM MobiCom Workshop on Challenged Networks (Chants 2011), Las Vegas, NV, USA}, event_place = {Las Vegas, NV, USA}, event_name = {ACM MobiCom Workshop on Challenged Networks (Chants 2011)}, event_date = {2011-09-23}, language = {en}, ISBN = {978-1-4503-0870-0}, DOI = {10.1145/2030652.2030666}, reviewed = {1}, author = {Wirtz, Hanno and Heer, Tobias and Backhaus, Robert and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath-long, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones}, year = {2011}, month = {9}, day = {21}, pages = {1--8}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-long.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6071934\&tag=1}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-1-4577-1803-8}, DOI = {http://dx.doi.org/10.1109/IPIN.2011.6071934}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Viol, Nicolai and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones (short paper)}, year = {2011}, month = {9}, day = {21}, pages = {1--4}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the de- tected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, note = {short paper (long paper is also available)}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath.pdf}, web_url = {http://ipin2011.dsi.uminho.pt/PDFs/Shortpaper/17_Short_Paper.pdf}, web_url2 = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-slides.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-972-8692-63-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Wehrle, Klaus} } @Inproceedings { 2011-wintech-wirtz, title = {Demo: Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode}, year = {2011}, month = {9}, day = {19}, pages = {89-90}, abstract = {Mobile Ad-Hoc Networks (MANETs) rely on the 802.11 ad- hoc mode to establish communication with nearby peers. In practice, this makes MANETs hard to realize. While 802.11-compliant mobile devices implement the ad-hoc mode on the hardware layer, the software layer typically does not implement support for ad-hoc networking in terms of ad-hoc routing and name resolution protocols. Modern mobile operating systems, such as Android and iOS, even hide the inherent ad-hoc functionality of the wireless card through restrictions in the OS. In contrast to this, support for the 802.11 infrastructure mode is a commodity. We propose establishing ad-hoc networks using the 802.11 infrastructure mode. In MA-Fi (Mobile Ad-Hoc Wi-Fi), a small core of mobile router nodes (RONs) provides infrastruc-ture mode network access to mobile station nodes (STANs). As RONs also act as a station in infrastructure networks of other RONs, MA-Fi achieves multi-hop communication between RON and STAN devices in the overall network. We show the creation and operation of mobile ad-hoc networks using MA-Fi. We focus on mobility of RONs and STANs as well as topology control in the overall network.}, url = {fileadmin/papers/2011/2011-wirtz-wintech.pdf}, misc = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA}, event_place = {Las Vegas, Nevada, USA}, event_name = {The Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization}, event_date = {2011-09-19}, language = {en}, ISBN = {978-1-4503-0867-0}, DOI = {10.1145/2030718.2030737}, reviewed = {1}, author = {Wirtz, Hanno and Backhaus, Robert and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { VaegsABW2011, title = {Efficient Power Management Using Out-of-Band Signaling}, year = {2011}, month = {9}, day = {16}, pages = {77-80}, abstract = {A tremendous amount of energy is wasted today, because computing devices are left running all the time even though they are needed only sporadically. Especially in office environments many devices (e.g., printers) are very rarely turned off, because they need to be available from time to time and because it is inconvenient having to switch them on and off manually. Existing solutions, such as Wake-on-LAN (WoL), provide support for managing the power consumption of the network devices remotely using an always-on data channel. However, these solutions are inefficient, because power to the network interface has to be maintained even when the host system is asleep just to ensure remote accessibility. We propose a Wireless Sensor Network (WSN) based out-of-band signaling architecture for network interfaces which minimizes the systems’ power consumption during the large idle periods when nobody is using them. This is done by separating the data and control channels on the Internet-enabled devices using a low-power out-of-band signaling channel based on battery driven, energy scavenging devices. Unlike existing solutions, which only allow parts of the system to go in sleep modes, our architecture allows the whole system, including the main power supply, to be shut down. Our initial investigation indicates a significant reduction in energy consumption of devices during idle times compared to the existing in-band signaling mechanisms such as WoL.}, keywords = {Energy Saving, Wireless Sensor Network, Out-of-Band Signalling}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-vaegs-fgsn-ecocom.pdf}, misc2 = {Online}, booktitle = {Proceedings of the 10th GI/ITG KuVS Fachgespr{\"a}ch Drahtlose Sensornetze (FGSN), Paderborn, Germany}, institution = {RWTH Aachen University}, event_place = {Paderborn, Germany}, event_name = {10th GI/ITG KuVS Fachgespr{\"a}ch Drahtlose Sensornetze (FGSN11)}, event_date = {September 15-16, 2011}, language = {en}, reviewed = {1}, author = {Vaegs, Tobias and Alizai, Muhammad Hamad and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2011-ipsn-alizai-pad, title = {Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks}, year = {2011}, month = {4}, url = {fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA}, event_place = {Chicago, IL, USA}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and G{\"o}tz, Stefan and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Poster { 2011-03-vomLehn-NSDI-PrivacyOnWeb, title = {Work in Progress: Uncovering the Privacy Implications of Web Usage [Poster]}, year = {2011}, month = {3}, note = {poster and abstract}, url = {fileadmin/papers/2011/2011-03-vomLehn-NSDI-PrivacyOnWeb.pdf}, misc2 = {Online}, booktitle = {8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA}, organization = {Usenix}, event_place = {Boston, MA, USA}, event_name = {NSDI}, event_date = {March 30 – April 1, 2011}, state = {accepted}, language = {en}, reviewed = {1}, author = {vom Lehn, Hendrik and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2010-sensys-alizai-tinywifi, title = {Poster Abstract: TinyOS Meets Wireless Mesh Networks}, year = {2010}, month = {11}, pages = {429-430}, abstract = {We present TinyWifi, a nesC code base extending TinyOS to support Linux powered network nodes. It enables developers to build arbitrary TinyOS applications and protocols and execute them directly on Linux by compiling for the new TinyWifi platform. Using TinyWifi as a TinyOS platform, we expand the applicability and means of evaluation of wireless protocols originally designed for sensornets towards inherently similar Linux driven ad hoc and mesh networks.}, affiliation = {Received Best Poster Award}, url = {fileadmin/papers/2010/2010-11-alizai-tinywifi-sensys.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1870058\&preflayout=flat}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4503-0344-6}, DOI = {10.1145/1869983.1870058}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kirchen, Bernhard and Bitsch Link, J{\'o} Agila and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 201004IPSNbitschratmote, title = {Demo Abstract: RatMote - A Sensor Platform for Animal Habitat Monitoring}, year = {2010}, month = {4}, day = {12}, pages = {432--433}, abstract = {In this work, we present RatMote, a new wireless sensor node for subterranean animal habitat monitoring. RatMote has been developed for project RatPack, which aims at creating a new method for behavioral research on rats in their natural environment using wireless sensor nodes. Recent development in microcontroller architecture allowed us to design a sensor node which calculates up to 22 times more operations per mAh than the widely used TelosB node. This significant performance and efficiency increase allows us to perform computationally demanding algorithms inside the node, needed for vocalization analysis, localization, and mapping.}, note = {Demo Abstract}, tags = {RatPack}, url = {fileadmin/papers/2010/2010-04-IPSN-bitsch-ratmote.pdf}, web_url = {http://doi.acm.org/10.1145/1791212.1791291}, misc2 = {Online}, publisher = {ACM}, address = {New York City, NY, USA}, series = {IPSN '10}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, organization = {ACM}, event_place = {Stockholm, Sweden}, event_name = {9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)}, event_date = {April 12-16, 2010}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791291}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Bretgeld, Thomas and Goliath, Andr{\'e} and Wehrle, Klaus} } @Inproceedings { 2010-bitsch-link-iq2s-burrowview, title = {BurrowView - Seeing the world through the eyes of rats}, year = {2010}, month = {3}, day = {29}, pages = {56 -- 61}, abstract = {For a long time, life sciences were restricted to look at animal habitats only post-factum. Pervasive computing puts us in the novel position to gain live views. In this paper we present BurrowView, an application that tracks the movement of rats in their natural habitat and reconstructs the underground tunnel system. To make reliable statements, special consideration has been taken with regard to the information quality. Our system is able to reconstruct paths up to a resolution of 20 cm, the length of a rat without its tail.}, tags = {RatPack}, url = {fileadmin/papers/2010/2010-03-IQ2S-link-burrowview.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5470603}, misc2 = {Online}, publisher = {IEEE}, address = {New York City, NY, USA}, booktitle = {Proceedings of the Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010), Mannheim, Germany}, organization = {IEEE}, event_place = {Mannheim, Germany}, event_name = {Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010)}, event_date = {March 29 to April 2, 2010}, language = {en}, ISBN = {978-1-4244-6605-4}, DOI = {10.1109/PERCOMW.2010.5470603}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Fabritius, Gregor and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { inproceedingsreference201001227195395138, title = {Iterative Source-Channel Decoding with Cross-Layer Support for Wireless VoIP}, year = {2010}, month = {1}, day = {18}, volume = {1}, pages = {1-6}, abstract = {This paper presents a cross-layer approach for iterative source-channel decoding (ISCD) in wireless VoIP networks. The novelty of the proposed method is the incorporation of both, speech bits as well as protocol header bits, into the ISCD process. The header bits take the role of pilot bits having perfect reliability. These bits are distributed over the frame as strong supporting points for the MAP decoder which results in a significant enhancement of the output speech quality compared to the benchmark scheme using ISCD for speech only. For this approach, we exploit new cross-layer concepts that support the direct communication between non-adjacent layers. These concepts enable the iterative exchange of extrinsic information between the source decoder located on the application layer and the channel decoder located on the physical layer. This technique can also be applied to audio and video transmission.}, tags = {refector}, url = {fileadmin/papers/2010/2010-01-scc-breddermann-iscd.pdf}, misc2 = {CD-ROM / DVD-ROM}, editor = {Rudolf Mathar, Christoph Ruland}, publisher = {VDE Verlag}, address = {Berlin, Germany}, series = {Proceedings of International ITG Conference on Source and Channel Coding}, booktitle = {Proceedings of International ITG Conference on Source and Channel Coding}, organization = {ITG}, event_place = {Siegen}, event_name = {International ITG Conference on Source and Channel Coding 2010}, event_date = {January 18-21, 2010}, language = {en}, ISBN = {978-3-8007-3211-1}, reviewed = {1}, author = {Breddermann, Tobias and Lueders, Helge and Vary, Peter and Aktas, Ismet and Schmidt, Florian} } @Inbook { 201001ThieleINTECHRatpack, title = {Dynamic Wireless Sensor Networks for Animal Behavior Research}, year = {2010}, month = {1}, pages = {629--644}, tags = {RatPack}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-01-Thiele-INTECH-Ratpack.pdf}, web_url = {http://sciyo.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research}, web_url2 = {http://www.intechopen.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research}, misc2 = {Online}, editor = {Domenico Campolo}, publisher = {InTech}, address = {Vienna, Austria}, chapter = {32}, booktitle = {Recent Advances in Biomedical Engineering}, language = {en}, ISBN = {978-953-7619-57-2}, reviewed = {1}, author = {Thiele, Johannes and Bitsch Link, J{\'o} Agila and Osechas, Okuary and Mallot, Hanspeter and Wehrle, Klaus} } @Inbook { 2010-kai-standardsedge_coordination, title = {Coordination in ICT Standards Setting}, year = {2010}, pages = {235-248}, url = {https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=\%2Fvar\%2Fwww\%2Ffileadmin\%2Fpapers\%2F2010\%2F\#}, misc2 = {print}, editor = {S. Bolin}, publisher = {The Bolin Group}, address = {San Francisco, CA, US}, chapter = {27}, booktitle = {The Standards Edge - Unifier or Divider?}, language = {en}, ISBN = {0974864854}, author = {Jakobs, Kai and Blind, Knut} } @Inproceedings { 200912BitschSimBetAge, title = {SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks}, year = {2009}, month = {12}, day = {1}, pages = {13--18}, abstract = {In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.}, tags = {RatPack}, url = {fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1659029.1659034\&coll=DL\&dl=GUIDE\&CFID=6806120\&CFTOKEN=29162094}, web_url2 = {http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf}, misc2 = {Online}, editor = {Paulo Mendes, Oliver Marc{\'e}}, publisher = {ACM}, address = {New York City, NY, USA}, series = {U-NET '09}, booktitle = {Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy}, organization = {ACM}, event_place = {Rome, Italy}, event_name = {1st ACM workshop on User-provided networking: challenges and opportunities}, event_date = {1 Dec. 2009}, language = {en}, ISBN = {978-1-60558-750-9}, DOI = {http://doi.acm.org/10.1145/1659029.1659034}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Viol, Nicolai and Goliath, Andr{\'e} and Wehrle, Klaus} } @Inproceedings { 2009-sensys-alizai-burstytraffic, title = {Bursty Traffic over Bursty Links}, year = {2009}, month = {11}, pages = {71-84}, tags = {wld}, url = {fileadmin/papers/2009/2009-alizai-sensys-bre.pdf}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA}, event_place = {Berkley, California}, event_name = {Sensys 09}, event_date = {November 2009}, language = {en}, ISBN = {978-1-60558-519-2}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Techreport { 200908alizaifgsnburstyrouting, title = {Routing Over Bursty Wireless Links}, year = {2009}, month = {9}, pages = {63-66}, abstract = {Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22\% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.}, tags = {wld}, url = {fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf}, web_url = {doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf}, misc2 = {Print}, publisher = {Technical University Hamburg}, address = {Technical University Hamburg}, booktitle = {Proceedings of the 8th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Hamburg, Germany}, language = {en}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { 200907BitschMOBIQUITOUS09SimBetAge, title = {SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking}, year = {2009}, month = {7}, day = {13}, pages = {1--2}, abstract = {In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs.}, note = {poster and abstract}, tags = {RatPack}, url = {fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363}, misc2 = {Online}, publisher = {IEEE}, address = {New York City, NY, USA}, booktitle = {Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada}, organization = {ICST/IEEE}, event_place = {Toronto, ON, Canada}, event_name = {6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)}, event_date = {July 13-16, 2009}, language = {en}, ISBN = {978-963-9799-59-2}, DOI = {10.4108/ICST.MOBIQUITOUS2009.7017}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Viol, Nicolai and Goliath, Andr{\'e} and Wehrle, Klaus} } @Article { 2009-thissen-JICWI-replication, title = {Improving Quality of Web Services by using Replication}, journal = {IADIS International Journal on WWW/Internet}, year = {2009}, volume = {7}, number = {1}, pages = {26-43}, misc2 = {Online}, publisher = {IADIS Press}, language = {en}, ISSN = {1645-7641}, author = {Thi{\ss}en, Dirk and Brambring, Thomas} } @Inproceedings { goetz2008adapt, title = {ADAPT: A Semantics-Oriented Protocol Architecture}, year = {2008}, month = {12}, day = {10}, volume = {5343/2008}, pages = {287-292}, abstract = {Although modularized protocol frameworks are flexible and adaptive to the increasing heterogeneity of networking environments, it remains a challenge to automatically compose communication stacks from protocol modules. The typical static classification into network layers or class hierarchies cannot appropriately accommodate cross-cutting changes such as overlay routing or cross-layer signaling. In this paper, we discuss how protocol composition can be driven by functionality and demand at runtime based on extensible semantic models of protocols and their execution environment. Such an approach allows to reason about the functionality and quality of automatically composed and adapted protocol compounds and it is open to existing and future protocols.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-goetz-mobiarch-adapt.pdf}, misc2 = {Print}, editor = {Karin Anna Hummel and James P. G. Sterbenz}, publisher = {Springer-Verlag}, address = {Tiergartenstra{\ss}e 17, 69121 Heidelberg, Germany}, series = {Lecture Notes in Computer Science}, booktitle = {Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {3rd International Workshop on Self-Organizing Systems (IWSOS)}, event_date = {2008-12-10}, language = {en}, ISBN = {978-3-540-92156-1}, DOI = {10.1007/978-3-540-92157-8\textbackslash_27}, reviewed = {1}, author = {G{\"o}tz, Stefan and Beckel, Christian and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 2008-sensys-sasnauskas-kleenet, title = {Poster Abstract: KleeNet - Automatic Bug Hunting in Sensor Network Applications}, year = {2008}, month = {11}, pages = {425--426}, abstract = {We present KleeNet, a Klee based bug hunting tool for sensor network applications before deployment. KleeNet automatically tests code for all possible inputs, ensures memory safety, and integrates well into TinyOS based application development life cycle, making it easy for developers to test their applications.}, keywords = {bug finding, memory safety, tinyos, type safety}, tags = {kleenet}, url = {fileadmin/papers/2008/2008-11-Sasnauskas-SenSys08-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 6th ACM conference on Embedded network sensor systems (SenSys'08), Raleigh, NC, USA}, language = {en}, ISBN = {978-1-59593-990-6}, DOI = {http://doi.acm.org/10.1145/1460412.1460485}, reviewed = {1}, author = {Sasnauskas, Raimondas and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { 200810ThieleSensors08RatPack, title = {Smart Sensors for Small Rodent Observation}, year = {2008}, month = {10}, day = {26}, pages = {709 -- 711}, abstract = {Working towards the observation of rats (and other small rodents) in the wild we have developed tools that will enable us to study their behavior using a wireless network of wearable sensor nodes. The space and weight constraints resulting from the size of the animals have led to simple but functional approaches for vocalization classification and position estimation. For the resulting data we have developed novel, delay-tolerant routing and collection strategies. These are expected to be used in a sparse, dynamic network resulting from various rats being tagged with our nodes and running around freely - an area that will eventually be too big to be covered solely by stationary data sinks. Furthermore, the system is designed to extract information on the social interactions between animals from the routing data. It currently works in an indoor environment and we are preparing it for tests in a controlled outdoor setup.}, tags = {RatPack}, url = {fileadmin/papers/2008/2008-10-Thiele-Sensors08-RatPack.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4716540}, misc2 = {Online}, publisher = {IEEE}, address = {New York City, NY, USA}, booktitle = {Proceedings of IEEE Sensors 2008, Lecce, Italy}, organization = {IEEE}, event_place = {Lecce, Italy}, event_name = {IEEE Sensors 2008}, event_date = {26-29 Oct. 2008}, language = {en}, ISBN = {978-1-4244-2580-8}, ISSN = {1930-0395}, DOI = {10.1109/ICSENS.2008.4716540}, reviewed = {1}, author = {Thiele, Johannes and Osechas, Okuary and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Techreport { 2008-fgsn-sasnauskas-kleenet, title = {Bug Hunting in Sensor Network Applications}, year = {2008}, month = {9}, abstract = {Testing sensor network applications is an essential and a difficult task. Due to their distributed and faulty nature, severe resource constraints, unobservable interactions, and limited human interaction, sensor networks, make monitoring and debugging of applications strenuous and more challenging. In this paper we present KleeNet - a Klee based platform independent bug hunting tool for sensor network applications before deployment - which can automatically test applications for all possible inputs, and hence, ensures memory safety for TinyOS based applications. Upon finding a bug, KleeNet generates a concrete test case with real input values identifying a specific error path in a program. Additionally, we show that KleeNet integrates well into TinyOS application development life cycle with minimum manual effort, making it easy for developers to test their applications.}, tags = {kleenet}, url = {fileadmin/papers/2008/2008-09-Sasnauskas-FGSN08-BugHunting.pdf}, web_url = {ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf}, misc2 = {Print}, publisher = {Freie Universit{\"a}t Berlin, Institute of Computer Science}, address = {Berlin, Germany}, booktitle = {Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany}, institution = {Chair of Communication and Distributed Systems (ComSys)}, language = {en}, reviewed = {1}, author = {Sasnauskas, Raimondas and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { 200808OsechasEMBC08RatPack, title = {Ratpack: Wearable Sensor Networks for Animal Observation}, year = {2008}, month = {8}, day = {20}, pages = {538--541}, abstract = {The goal of our project is to describe the behavior of rats. For this purpose we are using wireless sensor networks, monitoring various quantities that yield important information to complement current knowledge on the behavioral repertoire of rats. So far, on the sensing and processing side we have developed innovative, minimalist approaches pointing in two directions: vocalization analysis and movement tracking. On the data collection and routing side we have adapted to the known burrowing habits of rats by developing new methods for synchronization and data aggregation under the paradigm of sporadic connectivity in a sparse, dynamic network.}, keywords = {Animals;Behavior, Animal;Clothing;Equipment Design;Equipment Failure Analysis;Miniaturization;Monitoring, Ambulatory;Rats;Reproducibility of Results;Sensitivity and Specificity;Transducers;}, tags = {ratpack}, url = {fileadmin/papers/2008/2008-08-Osechas-EMBC08-RatPack.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4649209}, misc2 = {Online}, publisher = {The Printing House}, address = {Stoughton, WI, USA}, booktitle = {Proceedings of the 30th Annual International IEEE Engineering in Medicine and Biology Conference, Vancouver, BC, Canada}, organization = {IEEE EMBS}, event_place = {Vancouver, BC, Canada}, event_name = {Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE}, event_date = {20-25 Aug. 2008}, language = {en}, ISBN = {978-1-4244-1814-5}, ISSN = {1557-170X}, DOI = {10.1109/IEMBS.2008.4649209}, reviewed = {1}, author = {Osechas, Okuary and Thiele, Johannes and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 200808BitschSIGCOMM08RatPack, title = {RatPack: Communication in a Sparse Dynamic Network}, year = {2008}, month = {8}, day = {17}, pages = {467--468}, abstract = {The goal of this pro ject is to investigate the behavior of wild living rats using sensor networks. The main challenge with respect to communication is the sparse and very dynamic network determined by the burrow dwelling behavior of rats, which makes delay tolerant data transmission schemes a necessity. The physical and computional restrictions in embedded devices make routing an interesting challenge for which we are currently developing new strategies.}, tags = {ratpack}, url = {fileadmin/papers/2008/2008-08-Bitsch-SIGCOMM08-RatPack.pdf}, web_url2 = {http://conferences.sigcomm.org/sigcomm/2008/posters.php}, misc = {http://www.worldcat.org/title/sigcomm-08-proceedings-of-the-2008-sigcomm-conference-and-co-located-workshops-nsdr08-wosn08-mobiarch08-netecon08-presto08-seattle-wa-usa-august-17-22-2008/oclc/300481768}, misc2 = {Online}, publisher = {ACM}, address = {New York City, NY, USA}, booktitle = {ACM SIGCOMM 2008 Poster Proceedings, Seattle, WA, USA}, organization = {ACM}, event_place = {Seattle, WA, USA}, event_name = {ACM SIGCOMM 2008}, event_date = {August 17-22, 2008}, language = {en}, ISBN = {978-1-60558-175-0}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Osechas, Okuary and Thiele, Johannes} } @Techreport { 2008-fgsn-alizai-stle, title = {Challenges in Short-term Wireless Link Quality Estimation}, year = {2008}, month = {7}, pages = {27-30}, tags = {wld}, url = {fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf}, web_url = {ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf}, misc2 = {Print}, publisher = {Fachbereich Mathematik und Informatik}, address = {Berlin, Germany}, booktitle = {Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks}, event_name = {FGSN 08}, event_date = {September 2010}, language = {en}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus and Becher, Alexander} } @Inproceedings { 2008-becher-hotemnets-linkestimation, title = {Towards Short-Term Wireless Link Quality Estimation}, year = {2008}, month = {6}, day = {3}, pages = {1--5}, abstract = {Commonly, routing in sensor networks is limited to longterm stable links. Unstable links, although often promising to be of large routing progress, are not considered for packet forwarding as link estimators typically cannot handle their dynamics. In this paper we introduce short-term link estimation to capture link dynamics at a high resolution in time and to identify when these render a link temporarily reliable or unreliable. We identify such dynamics based on packet overhearing, predict short-term availability and unavailability, and adapt neighbor tables, thereby enlarging the set of links useable by any routing algorithm. Additionally, we show that short-term link estimation integrates seamlessly into today's sensor network link estimators and routing protocols.}, tags = {wld}, url = {fileadmin/papers/2008/2008-becher-hotemnets-linkestimation.pdf}, misc2 = {Online}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Charlottesville, VA, USA}, event_place = {Chalottesville, USA}, event_name = {Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08)}, event_date = {June 2-3, 2008}, language = {en}, ISBN = {978-1-60558-209-2}, reviewed = {1}, author = {Becher, Alexander and Landsiedel, Olaf and Kunz, Georg and Wehrle, Klaus} } @Inbook { 2008-thissen-LNCS-management, title = {Service Management for Development Tools}, year = {2008}, pages = {401-429}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Babich, Yuri and Spaniol, Otto and Thi{\ss}en, Dirk} } @Inbook { 2008-thissen-LNCS-synergy, title = {Synergy by Integrating New Functionality}, year = {2008}, pages = {519-526}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Becker, Simon and Heller, Markus and Jarke, Matthias and Marquardt, Wolfgang and Nagl, Manfred and Spaniol, Otto and Thi{\ss}en, Dirk} } @Inproceedings { 2008-thissen-ICEB-replication, title = {Replication of Web Services for QoS Guarantees in Web Service Composition}, year = {2008}, pages = {155-160}, misc2 = {CD-ROM}, publisher = {INSTICC}, booktitle = {Proceedings of the International Conference on e-Business (ICE-B 2008), Porto, Portugal}, event_place = {Porto, Portugal}, event_name = {International Conference on e-Business (ICE-B 2008)}, language = {en}, ISBN = {978-989-8111-58-6}, reviewed = {1}, author = {Thi{\ss}en, Dirk and Brambring, Thomas} } @Inproceedings { 2008-thissen-ICWI-replication, title = {Improving Quality of Web Services by using Replication}, year = {2008}, pages = {283-290}, misc2 = {CD-ROM}, publisher = {IADIS Press}, booktitle = {Proceedings of the IADIS International Conference on WWW and Internet (ICWI 2008), Freiburg, Germany}, event_place = {Freiburg}, event_name = {IADIS International Conference on WWW and Internet (ICWI 2008)}, event_date = {2008}, language = {en}, ISBN = {978-972-8924-68-3}, reviewed = {1}, author = {Thi{\ss}en, Dirk and Brambring, Thomas} } @Inproceedings { 200707BitschSNFGRatPack, title = {Ratpack: Using Sensor Networks for Animal Observation}, year = {2007}, month = {7}, day = {16}, volume = {2007-11}, pages = {95 -- 97}, abstract = {The goal of this project is to describe the behaviour of rats. To study this behaviour, we will resort to the use of wireless sensor networks, monitoring various quantities that yield important information to complement current knowledge on the behavioural repertoire of rats. The challenges we face include data acquisition and processing on the one hand, as rat-borne sensor nodes will need to be small enough not to interfere with the rats' own activities, thus limiting the available memory and processing capabilities. Additionally, rats spend a significant amount of time underground, making data transmission and routing a very interesting challenge, for which we are currently developing novel strategies.}, tags = {RatPack}, url = {fileadmin/papers/2007/2007-07-Bitsch-SNFG-RatPack.pdf}, misc2 = {Print}, editor = {Klaus Wehrle}, publisher = {RWTH Aachen University}, address = {Aachen, Germany}, series = {AIB}, booktitle = {6th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Aachen, Germany}, organization = {GI/ITG Fachgruppe ''Kommunikation und Verteilte Systeme''}, event_place = {Aachen, Germany}, event_name = {6th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks''}, event_date = {July 16-17, 2007}, language = {en}, ISSN = {0935-3232}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Osechas, Okuary and Thiele, Johannes and Mallot, Hanspeter} } @Inproceedings { GarciaMorchonEtAl2007, title = {Cooperative Security in Distributed Sensor Networks}, year = {2007}, volume = {1}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, series = {1}, booktitle = {Proceedings of the third International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007}, organization = {IEEE}, event_name = {CollaborateCom}, language = {en}, ISBN = {978-1-4244-1318-8}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Baldus, Heribert and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 200606LandsiedelRatWatch, title = {Rat Watch: Using Sensor Networks for Animal Observation}, year = {2006}, month = {6}, day = {19}, volume = {1}, pages = {1--2}, abstract = {In an attempt to employ sensor network technology for animal observation, in particular of wild rats, we identified several restrictive shortcomings in existing sensor network research, which we discuss in this paper.}, note = {(Poster and Abstract)}, tags = {RatPack}, url = {fileadmin/papers/2006/2006-06-Landsiedel-RatWatch.pdf}, web_url2 = {http://www.sics.se/realwsn06/program.html}, misc2 = {Online}, editor = {Pedro Jos{\'e} Marron and Thiemo Voigt}, publisher = {SICS}, address = {Uppsala, Sweden}, booktitle = {ACM Workshop on Real-World Wireless Sensor Networks (RealWSN) in conjunction with ACM MobiSys, Uppsala, Sweden}, organization = {ACM}, event_place = {Uppsala, Sweden}, event_name = {ACM Workshop on Real-World Wireless Sensor Networks, REALWSN'06}, event_date = {June 19, 2006}, language = {en}, reviewed = {1}, author = {Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Thiele, Johannes and Mallot, Hanspeter} } @Inproceedings { 200602LandsiedelEWSNModularSN, title = {Modular Communication Protocols for Sensor Networks}, year = {2006}, month = {2}, day = {13}, volume = {507}, pages = {22 -- 23}, abstract = {In this paper we present our ongoing work on modular communication protocols for sensor networks. Their modularity allows recomposing a protocol dynamically at runtime and adapting it to the changing needs of a sensor network. Compared to existing work, our componentization is fine grained and protocol independent, enabling a high degree of component reusability.}, note = {(Poster and Abstract)}, url = {fileadmin/papers/2006/2006-02-Landsiedel-EWSN-ModularSN.pdf}, web_url2 = {ftp://ftp.inf.ethz.ch/pub/publications/tech-reports/5xx/507.pdf}, misc = {Technical Report}, misc2 = {Online}, editor = {Kay R{\"o}mer and Holger Karl and Friedemann Matterns}, publisher = {Department of Computer Science, ETH Zurich}, address = {Zurich, Switzerland}, series = {Technical Report ETH Zurich / Dept. of Computer Science}, booktitle = {European Workshop on Wireless Sensor Networks (EWSN 2006), Zurich Switzerland}, organization = {EWSN}, event_place = {Zurich, Switzerland}, event_name = {3rd European Workshop on Wireless Sensor Networks (EWSN 2006)}, event_date = {February 13-15, 2006}, language = {en}, reviewed = {1}, author = {Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and Denkinger, Katharina and Wehrle, Klaus} } @Inproceedings { 200504mongerinformatiktage, title = {Eine strategieorientierte, modulare Simulationsumgebung f{\"u}r mobile Ad-Hoc-Szenarien}, year = {2005}, address = {Schloss Birlinghoven}, booktitle = {Proceedings of GI-Informatiktage 2005}, author = {Monger, Andreas and Hofmann, Stefanie and Bronni, Jan and Kronfeld, Marcel} } @Inproceedings { 2001-thissen-DSN-critical, title = {Monitoring and Control of Critical Infrastructures}, year = {2001}, volume = {2}, pages = {B68-B69}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001), Fast Abstract Track, G{\"o}teborg, Sweden}, event_place = {G{\"o}teborg, Sweden}, event_name = {International Conference on Dependable Systems and Networks (DSN 2001)}, language = {en}, ISBN = {0-7695-1101-5}, reviewed = {1}, author = {B{\"u}schkes, Roland and Thi{\ss}en, Dirk and Yu, Hai} }