This file was created by the TYPO3 extension
bib
--- Timezone: UTC
Creation date: 2024-12-06
Creation time: 01-16-57
--- Number of references
118
inproceedings
2025_pennekamp_mapxchange
MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps
2025
4
secure industrial collaboration; homomorphic encryption; data sharing; exchange platform; milling; process planning
internet-of-production
ACM
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing (SAC '25), March 31-April 4, 2025, Sicily, Italy
Sicily, Italy
ACM/SIGAPP Symposium on Applied Computing
March 31-April 4, 2025
accepted
1
JanPennekamp
JosephLeisten
PaulWeiler
MarkusDahlmanns
MarcelFey
ChrstianBrecher
SandraGeisler
KlausWehrle
inproceedings
2024_lohmoeller_tee_datasharing
Complementing Organizational Security in Data Ecosystems with Technical Guarantees
2024
12
19
Federated data ecosystems continue to emerge to connect previously isolated data silos across organizational boundaries over the Internet. These platforms aim to facilitate data sharing while maintaining data sovereignty, which is supposed to empower data owners to retain control over their data. However, the employed organizational security measures, such as policy-enforcing middleware besides software certification, processes, and employees are insufficient to provide reliable guarantees against malicious insiders. This paper thus proposes a corresponding technical solution for federated platforms that builds on communication between Trusted Execution Environments (TEEs) and demonstrates the feasibility of technically enforceable data protection. Specifically, we provide dependable guarantees for data owners formulated via rich policies while maintaining usability as a general-purpose data exchange platform. Further, by evaluating a real-world use case that concerns sharing sensitive genomic data, we demonstrate its real-world suitability. Our findings emphasize the potential of TEEs in establishing trust and increasing data security for federated data scenarios far beyond a single use case.
internet-of-production;health
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-lohmoeller-tee-data-sharing.pdf
IEEE
Proceedings of the 1st Conference on Building a Secure and Empowered Cyberspace (BuildSEC '24), December 19-21, 2024, New Delhi, India
New Delhi, India
Building a Secure & Empowered Cyberspace
December 19-21, 2024
accepted
en
1
JohannesLohmöller
RomanMatzutt
JoschaLoos
EduardVlad
JanPennekamp
KlausWehrle
inproceedings
2024_lohmoeller_scematch
scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data
2024
12
17
Advances in single-cell RNA sequencing (scRNA-seq) have dramatically enhanced our understanding of cellular functions and disease mechanisms. Despite its potential, scRNA-seq faces significant challenges related to data privacy, cost, and Intellectual Property (IP) protection, which hinder the sharing and collaborative use of these sensitive datasets. In this paper, we introduce a novel method, scE(match), a privacy-preserving tool that facilitates the matching of single-cell clusters between different datasets by relying on scmap as an established projection tool, but without compromising data privacy or IP. scE(match) utilizes homomorphic encryption to ensure that data and unique cell clusters remain confidential while enabling the identification of overlapping cell types for further collaboration and downstream analysis. Our evaluation shows that scE(match) performantly matches cell types across datasets with high precision, addressing both practical and ethical concerns in sharing scRNA-seq data. This approach not only supports secure data collaboration but also fosters advances in biomedical research by reliably protecting sensitive information and IP rights.
confidentiality; scmap; privacy-preserving computations; offloading; healthcare
rfc;health
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-lohmoeller-scEmatch.pdf
IEEE
Proceedings of the International Workshop on AI-Driven Trust, Security and Privacy in Computer Networks (AI-Driven TSP '24), co-located with the 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '24), December 17-21, 2024, Sanya, China
Sanya, China
TrustCom 2024
December 17-21, 2024
accepted
en
1
JohannesLohmöller
JannisScheiber
RafaelKramann
KlausWehrle
SikanderHayat
JanPennekamp
article
2024_querfurth_mcbert
mcBERT: Patient-Level Single-cell Transcriptomics Data Representation
bioRxiv
2024
11
7
health
10.1101/2024.11.04.621897
Benediktvon Querfurth
JohannesLohmöller
JanPennekamp
ToreBleckwehl
RafaelKramann
KlausWehrle
SikanderHayat
inproceedings
2024_lohmoeller_consent
Toward Technically Enforceable Consent in Healthcare Research
2024
10
17
4
7-12
health
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-lohmoeller-consent-aware-discovery.pdf
Online
Fraunhofer ISI
Research Papers of the Platform Privacy, 2024, October 17-18, Berlin, Germany
Berlin
Plattform Privatheit
October 17-18, 2024
en
2942-8874
10.24406/publica-3685
1
JohannesLohmöller
JanPennekamp
KlausWehrle
inproceedings
2024-dahlmanns-cired
Reliable and Secure Control Center to Station Device Communication
2024
6
19
The increasing demands on the power grid require intelligent and flexible solutions that ensure the grid's stability. Many of these measures involve sophisticated communication between the control center and the stations that is not efficiently realizable using traditional protocols, e.g., IEC 60870-5-104. To this end, IEC 61850 introduces data models which allow flexible communication. Still, the specification leaves open how DSOs should interconnect their stations to realize resilient communication between the control center and station devices. However, DSOs require such communication to adapt modern solutions increasing the grid's capacity, e.g., adaptive protection systems.
In this paper, we present our envisioned network and communication concept for future DSO's ICT infrastructures that enables the control center to resiliently and flexibly communicate with station devices. For resilience, we suggest interconnecting each station with two distinct communication paths to the control center, use MPLS-TP and MPTCP for fast failovers when a single link fails, and mTLS to protect the communication possibilities against misuse. Additionally, in accordance with IEC 61850, we envision the control center to communicate with the station devices using MMS by using the station RTU as a proxy.
ven2us
Proceedings of the CIRED workshop on Increasing Distribution Network Hosting Capacity 2024, June 19-20, 2024, Vienna, Austria
Vienna
CIRED workshop on Increasing Distribution Network Hosting Capacity 2024
June 19-20, 2024
10.1049/icp.2024.2096
1
MarkusDahlmanns
Ina BereniceFink
GerritErichsen
GuosongLin
ThomasHammer
BurkhardBorkenhagen
SebastianSchneider
ChristofMaahsen
KlausWehrle
inproceedings
2024_dahlmanns_ipv6-deployments
Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet
2024
5
10
Internet-wide studies provide extremely valuable insight into how operators manage their Internet of Things (IoT) deployments in reality and often reveal grievances, e.g., significant security issues. However, while IoT devices often use IPv6, past studies resorted to comprehensively scan the IPv4 address space. To fully understand how the IoT and all its services and devices is operated, including IPv6-reachable deployments is inevitable-although scanning the entire IPv6 address space is infeasible. In this paper, we close this gap and examine how to best discover IPv6-reachable IoT deployments. To this end, we propose a methodology that allows combining various IPv6 scan direction approaches to understand the findability and prevalence of IPv6-reachable IoT deployments. Using three sources of active IPv6 addresses and eleven address generators, we discovered 6658 IoT deployments. We derive that the available address sources are a good starting point for finding IoT deployments. Additionally, we show that using two address generators is sufficient to cover most found deployments and save time as well as resources. Assessing the security of the deployments, we surprisingly find similar issues as in the IPv4 Internet, although IPv6 deployments might be newer and generally more up-to-date: Only 39% of deployments have access control in place and only 6.2% make use of TLS inviting attackers, e.g., to eavesdrop sensitive data.
Internet of Things, security, Internet measurements, IPv6, address generators
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-dahlmanns-ipv6.pdf
IEEE
Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24), May 6-10, 2024, Seoul, Korea
Seoul, Korea
2024 IEEE Network Operations and Management Symposium
May 6-10, 2024
10.1109/NOMS59830.2024.10574963
1
MarkusDahlmanns
FelixHeidenreich
JohannesLohmöller
JanPennekamp
KlausWehrle
MartinHenze
article
2024_lohmoeller_sovereignty-survey
The Unresolved Need for Dependable Guarantees on Security, Sovereignty, and Trust in Data Ecosystems
Data & Knowledge Engineering
2024
5
1
151
Data ecosystems emerged as a new paradigm to facilitate the automated and massive exchange of data from heterogeneous information sources between different stakeholders. However, the corresponding benefits come with unforeseen risks as sensitive information is potentially exposed, questioning their reliability. Consequently, data security is of utmost importance and, thus, a central requirement for successfully realizing data ecosystems. Academia has recognized this requirement, and current initiatives foster sovereign participation via a federated infrastructure where participants retain local control over what data they offer to whom. However, recent proposals place significant trust in remote infrastructure by implementing organizational security measures such as certification processes before the admission of a participant. At the same time, the data sensitivity incentivizes participants to bypass the organizational security measures to maximize their benefit. This issue significantly weakens security, sovereignty, and trust guarantees and highlights that organizational security measures are insufficient in this context. In this paper, we argue that data ecosystems must be extended with technical means to (re)establish dependable guarantees. We underpin this need with three representative use cases for data ecosystems, which cover personal, economic, and governmental data, and systematically map the lack of dependable guarantees in related work. To this end, we identify three enablers of dependable guarantees, namely trusted remote policy enforcement, verifiable data tracking, and integration of resource-constrained participants. These enablers are critical for securely implementing data ecosystems in data-sensitive contexts.
Data sharing; Confidentiality; Integrity protection; Data Markets; Distributed databases
internet-of-production; coat-ers; vesitrust; health
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-lohmoeller-data-sovereignty-survey.pdf
Elsevier
0169-023X
10.1016/j.datak.2024.102301
1
JohannesLohmöller
JanPennekamp
RomanMatzutt
Carolin VictoriaSchneider
EduardVlad
ChristianTrautwein
KlausWehrle
article
2024_pennekamp_supply-chain-survey
An Interdisciplinary Survey on Information Flows in Supply Chains
ACM Computing Surveys
2024
2
1
56
2
Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.
information flows; data communication; supply chain management; data security; data sharing; systematic literature review
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf
ACM
0360-0300
10.1145/3606693
1
JanPennekamp
RomanMatzutt
ChristopherKlinkmüller
LennartBader
MartinSerror
EricWagner
SidraMalik
MariaSpiß
JessicaRahn
TanGürpinar
EduardVlad
Sander J. J.Leemans
Salil S.Kanhere
VolkerStich
KlausWehrle
inproceedings
2023_lohmoeller_transparency
Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems
2023
11
27
data usage control; data ecosystems; transparency logs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-lohmoeller-transparency.pdf
ACM
Proceedings of the 2023 ACM SIGSAC Conference on
Computer and Communications Security (CCS ’23), November 26-30, 2023, Copenhagen, Denmark
Copenhagen, Denmark
November 26-30, 2023
979-8-4007-0050-7/23/11
10.1145/3576915.3624371
1
JohannesLohmöller
EduardVlad
MarkusDahlmanns
KlausWehrle
article
2023_pennekamp_purchase_inquiries
Offering Two-Way Privacy for Evolved Purchase Inquiries
ACM Transactions on Internet Technology
2023
11
17
23
4
Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today's established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches' scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.
bootstrapping procurement; secure industrial collaboration; private set intersection; homomorphic encryption; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-purchase-inquiries.pdf
ACM
1533-5399
10.1145/3599968
1
JanPennekamp
MarkusDahlmanns
FrederikFuhrmann
TimoHeutmann
AlexanderKreppein
DennisGrunert
ChristophLange
Robert H.Schmitt
KlausWehrle
article
2023_lamberts_metrics-sok
SoK: Evaluations in Industrial Intrusion Detection Research
Journal of Systems Research
2023
10
31
3
1
Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This huge momentum facilitates the exploration of diverse promising paths but likewise risks fragmenting the research landscape and burying promising progress. Consequently, it needs sound and comprehensible evaluations to mitigate this risk and catalyze efforts into sustainable scientific progress with real-world applicability. In this paper, we therefore systematically analyze the evaluation methodologies of this field to understand the current state of industrial intrusion detection research. Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences. While we observe an increased use of public datasets, publications still only evaluate 1.3 datasets on average, and frequently used benchmarking metrics are ambiguous. At the same time, the adoption of newly developed benchmarking metrics sees little advancement. Finally, our systematic analysis enables us to provide actionable recommendations for all actors involved and thus bring the entire research field forward.
internet-of-production, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-lamberts-metrics-sok.pdf
eScholarship Publishing
2770-5501
10.5070/SR33162445
1
OlavLamberts
KonradWolsing
EricWagner
JanPennekamp
JanBauer
KlausWehrle
MartinHenze
article
Jakobs_2023_3
Preserving the Royalty-Free Standards Ecosystem
European Intellectual Property Review
2023
7
45
7
371-375
It has long been recognized in Europe and elsewhere that standards-development organizations (SDOs) may adopt policies that require their participants to license patents essential to the SDO’s standards (standards-essential patents or SEPs) to manufacturers of standardized products (“implementers”) on a royalty-free (RF) basis. This requirement contrasts with SDO policies that permit SEP holders to charge implementers monetary patent royalties, sometimes on terms that are specified as “fair, reasonable and nondiscriminatory” (FRAND). As demonstrated by two decades of intensive litigation around the world, FRAND royalties have given rise to intractable disputes regarding the manner in which such royalties should be calculated and adjudicated. In contrast, standards distributed on an RF basis are comparatively free from litigation and the attendant transaction costs. Accordingly, numerous SDOs around the world have adopted RF licensing policies and many widely adopted standards, including Bluetooth, USB, IPv6, HTTP, HTML and XML, are distributed on an RF basis. This note briefly discusses the commercial considerations surrounding RF standards, the relationship between RF standards and open source software (OSS) and the SDO policy mechanisms – including “universal reciprocity” -- that enable RF licensing to succeed in the marketplace.
0142-0461
10.2139/ssrn.4235647
1
JorgeContreras
RudiBekkers
BradBiddle
EnricoBonadio
Michael A.Carrier
BernardChao
CharlesDuan
RichardGilbert
JoachimHenkel
ErikHovenkamp
MartinHusovec
KaiJakobs
Dong-hyuKim
Mark A.Lemley
Brian J.Love
LukeMcDonagh
Fiona M.Scott Morton
JasonSchultz
TimothySimcoe
Jennifer M.Urban
Joy YXiang
inproceedings
2023_pennekamp_benchmarking_comparison
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
2023
6
15
13901
489-505
Benchmarking is an essential tool for industrial organizations to identify potentials that allows them to improve their competitive position through operational and strategic means. However, the handling of sensitive information, in terms of (i) internal company data and (ii) the underlying algorithm to compute the benchmark, demands strict (technical) confidentiality guarantees—an aspect that existing approaches fail to address adequately. Still, advances in private computing provide us with building blocks to reliably secure even complex computations and their inputs, as present in industry benchmarks. In this paper, we thus compare two promising and fundamentally different concepts (hardware- and software-based) to realize privacy-preserving benchmarks. Thereby, we provide detailed insights into the concept-specific benefits. Our evaluation of two real-world use cases from different industries underlines that realizing and deploying secure information systems for industry benchmarking is possible with today's building blocks from private computing.
Lecture Notes in Computer Science (LNCS), Volume 13901
real-world computing; trusted execution environments; homomorphic encryption; key performance indicators; benchmarking
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-industry-benchmarking.pdf
Springer
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain
Zaragoza, Spain
35th International Conference on Advanced Information Systems Engineering (CAiSE '23)
June 12-16, 2023
978-3-031-34559-3
0302-9743
10.1007/978-3-031-34560-9_29
1
JanPennekamp
JohannesLohmöller
EduardVlad
JoschaLoos
NiklasRodemann
PatrickSapel
Ina BereniceFink
SethSchmitz
ChristianHopmann
MatthiasJarke
GüntherSchuh
KlausWehrle
MartinHenze
article
2023-circres-wu-comp-ecosystem
Use of Computation Ecosystems to Analyze the Kidney-Heart Crosstalk
Circulation research
2023
4
14
132
8
1084-1100
The identification of mediators for physiologic processes, correlation of molecular processes, or even pathophysiological processes within a single organ such as the kidney or heart has been extensively studied to answer specific research questions using organ-centered approaches in the past 50 years. However, it has become evident that these approaches do not adequately complement each other and display a distorted single-disease progression, lacking holistic multilevel/multidimensional correlations. Holistic approaches have become increasingly significant in understanding and uncovering high dimensional interactions and molecular overlaps between different organ systems in the pathophysiology of multimorbid and systemic diseases like cardiorenal syndrome because of pathological heart-kidney crosstalk. Holistic approaches to unraveling multimorbid diseases are based on the integration, merging, and correlation of extensive, heterogeneous, and multidimensional data from different data sources, both -omics and nonomics databases. These approaches aimed at generating viable and translatable disease models using mathematical, statistical, and computational tools, thereby creating first computational ecosystems. As part of these computational ecosystems, systems medicine solutions focus on the analysis of -omics data in single-organ diseases. However, the data–scientific requirements to address the complexity of multimodality and multimorbidity reach far beyond what is currently available and require multiphased and cross-sectional approaches. These approaches break down complexity into small and comprehensible challenges. Such holistic computational ecosystems encompass data, methods, processes, and interdisciplinary knowledge to manage the complexity of multiorgan crosstalk. Therefore, this review summarizes the current knowledge of kidney-heart crosstalk, along with methods and opportunities that arise from the novel application of computational ecosystems providing a holistic analysis on the example of kidney-heart crosstalk.
disease progression; ecosystem; heart; kidney; multimorbidity
coat-ers
Online
en
10.1161/CIRCRESAHA.123.321765
1
ZhuojunWu
JohannesLohmöller
ChristianeKuhl
KlausWehrle
JoachimJankowski
incollection
2023_pennekamp_crd-a.i
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
2023
2
8
35-60
The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_2
1
JanPennekamp
AnastasiiaBelova
ThomasBergs
MatthiasBodenbenner
AndreasBührig-Polaczek
MarkusDahlmanns
IkeKunze
MoritzKröger
SandraGeisler
MartinHenze
DanielLütticke
BenjaminMontavon
PhilippNiemietz
LuciaOrtjohann
MaximilianRudack
Robert H.Schmitt
UweVroomen
KlausWehrle
MichaelZeng
incollection
2023_rueppel_crd-b2.ii
Model-Based Controlling Approaches for Manufacturing Processes
2023
2
8
221-246
The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).
Process control; Model-based control; Data aggregation; Model identification; Model optimization
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_7
1
Adrian KarlRüppel
MuzafferAy
BenediktBiernat
IkeKunze
MarkusLandwehr
SamuelMann
JanPennekamp
PascalRabe
Mark P.Sanders
DominikScheurenberg
SvenSchiller
TiandongXi
DirkAbel
ThomasBergs
ChristianBrecher
UweReisgen
Robert H.Schmitt
KlausWehrle
inproceedings
2023-lorz-cired
Interconnected grid protection systems - reference grid for testing an adaptive protection scheme
2023
3286-3290
ven2us
27th International Conference on Electricity Distribution (CIRED 2023), Rome, Italy, June 12-15, 2023
Rome, Italy
International Conference & Exhibition on Electricity Distribution (CIRED)
June 12-15, 2023
10.1049/icp.2023.0864
1
TobiasLorz
JohannJaeger
AntigonaSelimaj
ImmanuelHacker
AndreasUlbig
Jan-PeterHeckel
ChristianBecker
MarkusDahlmanns
Ina BereniceFink
KlausWehrle
GerritErichsen
MichaelSchindler
RainerLuxenburger
GuosongLin
inproceedings
2022_pennekamp_cumul
CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research
2022
12
8
RWTH-2022-10811
Anonymous communication on the Internet is about hiding the relationship between communicating parties. At NDSS '16, we presented a new website fingerprinting approach, CUMUL, that utilizes novel features and a simple yet powerful algorithm to attack anonymization networks such as Tor. Based on pattern observation of data flows, this attack aims at identifying the content of encrypted and anonymized connections. Apart from the feature generation and the used classifier, we also provided a large dataset to the research community to study the attack at Internet scale. In this paper, we emphasize the impact of our artifacts by analyzing publications referring to our work with respect to the dataset, feature extraction method, and source code of the implementation. Based on this data, we draw conclusions about the impact of our artifacts on the research field and discuss their influence on related cybersecurity topics. Overall, from 393 unique citations, we discover more than 130 academic references that utilize our artifacts, 61 among them are highly influential (according to SemanticScholar), and at least 35 are from top-ranked security venues. This data underlines the significant relevance and impact of our work as well as of our artifacts in the community and beyond.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-pennekamp-cumul-artifacts.pdf
https://www.acsac.org/2022/program/artifacts_competition/
ACSA
Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA
Austin, TX, USA
38th Annual Computer Security Applications Conference (ACSAC '22)
December 5-9, 2022
10.18154/RWTH-2022-10811
1
JanPennekamp
MartinHenze
AndreasZinnen
FabianLanze
KlausWehrle
AndriyPanchenko
inproceedings
2022-wireless-anycast
Harnessing Cooperative Anycast Communication for Increased Resilience in Wireless Control
Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)
2022
12
reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-glebke-wireless-anycast.pdf
IEEE
Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)
10.1109/CDC51059.2022.9992864
1
RenéGlebke
JanScheiper
StefanLenz
MirkoStoffers
KlausWehrle
inproceedings
2022_lohmoeller_sovereignty
On the Need for Strong Sovereignty in Data Ecosystems
2022
9
5
3306
51-63
Data ecosystems are the foundation of emerging data-driven business models as they (i) enable an automated exchange between their participants and (ii) provide them with access to huge and heterogeneous data sources. However, the corresponding benefits come with unforeseen risks as also sensitive information is potentially exposed. Consequently, data security is of utmost importance and, thus, a central requirement for the successful implementation of these ecosystems. Current initiatives, such as IDS and GAIA-X, hence foster sovereign participation via a federated infrastructure where participants retain local control. However, these designs place significant trust in remote infrastructure by mostly implementing organizational security measures such as certification processes prior to admission of a participant. At the same time, due to the sensitive nature of involved data, participants are incentivized to bypass security measures to maximize their own benefit: In practice, this issue significantly weakens sovereignty guarantees. In this paper, we hence claim that data ecosystems must be extended with technical means to reestablish such guarantees. To underpin our position, we analyze promising building blocks and identify three core research directions toward stronger data sovereignty, namely trusted remote policy enforcement, verifiable data tracking, and integration of resource-constrained participants. We conclude that these directions are critical to securely implement data ecosystems in data-sensitive contexts.
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-lohmoeller-deco.pdf
CEUR Workshop Proceedings
Proceedings of the 1st International Workshop on Data Ecosystems (DEco '22), co-located with the 48th International Conference on Very Large Databases (VLDB '22), September 5-9, 2022, Sydney, Australia,
Sydney, Australia
International Workshop on Data Ecosystems (DEco '22)
September 5, 2022
1613-0073
1
JohannesLohmöller
JanPennekamp
RomanMatzutt
KlausWehrle
inproceedings
2022_dahlmanns_tlsiiot
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
2022
5
31
252-266
The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed to use TLS. To understand whether these changes indeed lead to secure Industrial Internet of Things deployments, i.e., using TLS-based protocols, which are configured according to security best practices, we perform an Internet-wide security assessment of ten industrial protocols covering the complete IPv4 address space.
Our results show that both, retrofitted existing protocols and newly developed secure alternatives, are barely noticeable in the wild. While we find that new protocols have a higher TLS adoption rate than traditional protocols (7.2 % vs. 0.4 %), the overall adoption of TLS is comparably low (6.5 % of hosts). Thus, most industrial deployments (934,736 hosts) are insecurely connected to the Internet. Furthermore, we identify that 42 % of hosts with TLS support (26,665 hosts) show security deficits, e.g., missing access control. Finally, we show that support in configuring systems securely, e.g., via configuration templates, is promising to strengthen security.
industrial communication; network security; security configuration
internet-of-production, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-dahlmanns-asiaccs.pdf
ACM
Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan
Nagasaki, Japan
ASIACCS '22
May 30-June 3, 2022
978-1-4503-9140-5/22/05
10.1145/3488932.3497762
1
MarkusDahlmanns
JohannesLohmöller
JanPennekamp
JörnBodenhausen
KlausWehrle
MartinHenze
article
2022_brauner_iop
A Computer Science Perspective on Digital Transformation in Production
ACM Transactions on Internet of Things
2022
5
1
3
2
The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.
Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf
ACM
2691-1914
10.1145/3502265
1
PhilippBrauner
ManuelaDalibor
MatthiasJarke
IkeKunze
IstvánKoren
GerhardLakemeyer
MartinLiebenberg
JudithMichael
JanPennekamp
ChristophQuix
BernhardRumpe
Wilvan der Aalst
KlausWehrle
AndreasWortmann
MartinaZiefle
inproceedings
2022-lorenz-ven2us
Interconnected network protection systems - the basis for the reliable and safe operation of distribution grids with a high penetration of renewable energies and electric vehicle
2022
Power grids are increasingly faced with the introduction of decentralized, highly volatile power supplies from renewable energies and high loads occurring from e-mobility. However, today’s static grid protection cannot manage all upcoming conditions while providing a high level of dependability and security. It forms a bottleneck of a future decarbonizing grid development.
In our research project, we develop and verify an adaptive grid protection algorithm. It calculates situation dependent protection parameters for the event of power flow shifts and topology changes caused by volatile power supplies due to the increase of renewable generation and the rapid expansion of e-mobility. As a result the distribution grid can be operated with the optimally adapted protection parameters and functions for changing operating states. To safely adjust the values on protection hardware in the field, i.e., safe from hardware failures and cyberattacks, we research resilient and secure communication concepts for the adaptive and interconnected grid protection system. Finally, we validate our concept and system by demonstrations in the laboratory and field tests.
ven2us
Proceedings of the CIRED workshop on E-mobility and power distribution systems 2022, June 2-3, 2022, Porto, Portugal
Porto
CIRED workshop on E-mobility and power distribution systems 2022
June 2-3, 2022
10.1049/icp.2022.0768
1
MatthiasLorenz
Tobias MarkusPletzer
MalteSchuhmacher
TorstenSowa
MichaelDahms
SimonStock
DavoodBabazadeh
ChristianBecker
JohannJaeger
TobiasLorz
MarkusDahlmanns
Ina BereniceFink
KlausWehrle
AndreasUlbig
PhilippLinnartz
AntigonaSelimaj
ThomasOffergeld
inproceedings
2021_mitseva_sequences
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages
2021
11
17
2411-2413
Website fingerprinting (WFP) is a special case of traffic analysis, where a passive attacker infers information about the content of encrypted and anonymized connections by observing patterns of data flows. Although modern WFP attacks pose a serious threat to online privacy of users, including Tor users, they usually aim to detect single pages only. By ignoring the browsing behavior of users, the attacker excludes valuable information: users visit multiple pages of a single website consecutively, e.g., by following links. In this paper, we propose two novel methods that can take advantage of the consecutive visits of multiple pages to detect websites. We show that two up to three clicks within a site allow attackers to boost the accuracy by more than 20% and to dramatically increase the threat to users' privacy. We argue that WFP defenses have to consider this new dimension of the attack surface.
Traffic Analysis; Website Fingerprinting; Web Privacy
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mitseva-fingerprinting-sequences.pdf
ACM
Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea
Seoul, Korea
November 15-19, 2021
978-1-4503-8454-4/21/11
10.1145/3460120.3485347
1
AsyaMitseva
JanPennekamp
JohannesLohmöller
TorstenZiemann
CarlHoerchner
KlausWehrle
AndriyPanchenko
inproceedings
2021_pennekamp_bootstrapping
Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships
2021
11
15
RWTH-2021-09499
In addition to quality improvements and cost reductions, dynamic and flexible business relationships are expected to become more important in the future to account for specific customer change requests or small-batch production. Today, despite reservation, sensitive information must be shared upfront between buyers and sellers. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness following information leaks or breaches of their privacy. To address this issue, the concepts of confidential computing and cloud computing come to mind as they promise to offer scalable approaches that preserve the privacy of participating companies. In particular, designs building on confidential computing can help to technically enforce privacy. Moreover, cloud computing constitutes an elegant design choice to scale these novel protocols to industry needs while limiting the setup and management overhead for practitioners. Thus, novel approaches in this area can advance the status quo of bootstrapping new relationships as they provide privacy-preserving alternatives that are suitable for immediate deployment.
bootstrapping procurement; business relationships; secure industrial collaboration; privacy; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-bootstrapping.pdf
RWTH Aachen University
Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea
RWTH Aachen University
Seoul, Korea
November 14, 2021
10.18154/RWTH-2021-09499
JanPennekamp
FrederikFuhrmann
MarkusDahlmanns
TimoHeutmann
AlexanderKreppein
DennisGrunert
ChristophLange
Robert H.Schmitt
KlausWehrle
inproceedings
2021-glebke-service-based-forwarding
Service-based Forwarding via Programmable Dataplanes
2021
6
10
reflexes
/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf
IEEE
Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)
978-1-6654-4005-9
2325-5609
10.1109/HPSR52026.2021.9481814
1
RenéGlebke
DirkTrossen
IkeKunze
DavidLou
JanRüth
MirkoStoffers
KlausWehrle
article
2021_bader_privaccichain
Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability
Information Processing & Management
2021
5
1
58
3
The benefits of information sharing along supply chains are well known for improving productivity and reducing costs. However, with the shift towards more dynamic and flexible supply chains, privacy concerns severely challenge the required information retrieval. A lack of trust between the different involved stakeholders inhibits advanced, multi-hop information flows, as valuable information for tracking and tracing products and parts is either unavailable or only retained locally. Our extensive literature review of previous approaches shows that these needs for cross-company information retrieval are widely acknowledged, but related work currently only addresses them insufficiently. To overcome these concerns, we present PrivAccIChain, a secure, privacy-preserving architecture for improving the multi-hop information retrieval with stakeholder accountability along supply chains. To address use case-specific needs, we particularly introduce an adaptable configuration of transparency and data privacy within our design. Hence, we enable the benefits of information sharing as well as multi-hop tracking and tracing even in supply chains that include mutually distrusting stakeholders. We evaluate the performance of PrivAccIChain and demonstrate its real-world feasibility based on the information of a purchasable automobile, the e.GO Life. We further conduct an in-depth security analysis and propose tunable mitigations against common attacks. As such, we attest PrivAccIChain's practicability for information management even in complex supply chains with flexible and dynamic business relationships.
multi-hop collaboration; tracking and tracing; Internet of Production; e.GO; attribute-based encryption
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-bader-ipm-privaccichain.pdf
Elsevier
0306-4573
10.1016/j.ipm.2021.102529
1
LennartBader
JanPennekamp
RomanMatzutt
DavidHedderich
MarkusKowalski
VolkerLücken
KlausWehrle
article
2021_schomakers_insights
Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives
Computer Law Review International
2021
2
15
22
1
8-15
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity, Privacy, European Data Protection Law
1610-7608
10.9785/cri-2021-220103
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle
inproceedings
2019_rut_schomakers_privacy
Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity
2021
1
27
857-870
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity,Privacy,European Data Protection Law
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf
https://dl.gi.de/handle/20.500.12116/34788
https://arxiv.org/abs/1911.06569
Gesellschaft für Informatik
Bonn
INFORMATIK 2020
Karlsruhe, Germany
INFORMATIK 2020
2020-09-28 to 2020-10-01
English
10.18420/inf2020_76
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle
inproceedings
2020_pennekamp_parameter_exchange
Privacy-Preserving Production Process Parameter Exchange
2020
12
10
510-525
Nowadays, collaborations between industrial companies always go hand in hand with trust issues, i.e., exchanging valuable production data entails the risk of improper use of potentially sensitive information. Therefore, companies hesitate to offer their production data, e.g., process parameters that would allow other companies to establish new production lines faster, against a quid pro quo. Nevertheless, the expected benefits of industrial collaboration, data exchanges, and the utilization of external knowledge are significant.
In this paper, we introduce our Bloom filter-based Parameter Exchange (BPE), which enables companies to exchange process parameters privacy-preservingly. We demonstrate the applicability of our platform based on two distinct real-world use cases: injection molding and machine tools. We show that BPE is both scalable and deployable for different needs to foster industrial collaborations. Thereby, we reward data-providing companies with payments while preserving their valuable data and reducing the risks of data leakage.
secure industrial collaboration; Bloom filter; oblivious transfer; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-parameter-exchange.pdf
ACM
Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA
Austin, TX, USA
December 7-11, 2020
978-1-4503-8858-0/20/12
10.1145/3427228.3427248
1
JanPennekamp
ErikBuchholz
YannikLockner
MarkusDahlmanns
TiandongXi
MarcelFey
ChristianBrecher
ChristianHopmann
KlausWehrle
inproceedings
2020-henze-ccs-cybersecurity
Poster: Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
2020
11
9
Mitigating cybersecurity threats in power distribution grids requires a testbed for cybersecurity, e.g., to evaluate the (physical) impact of cyberattacks, generate datasets, test and validate security approaches, as well as train technical personnel. In this paper, we present a blueprint for such a testbed that relies on network emulation and power flow computation to couple real network applications with a simulated power grid. We discuss the benefits of our approach alongside preliminary results and various use cases for cybersecurity research and training for power distribution grids.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-henze-ccs-cybersecurity.pdf
ACM
New York, NY, USA
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Virtual Event, USA
November 9-13, 2020
10.1145/3372297.3420016
1
MartinHenze
LennartBader
JulianFilter
OlavLamberts
SimonOfner
Dennisvan der Velde
inproceedings
2020-dahlmanns-imc-opcua
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
2020
10
27
101-110
Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are configured securely, we actively scan the IPv4 address space for publicly reachable OPC UA systems and assess the security of their configurations. We observe problematic security configurations such as missing access control (on 24% of hosts), disabled security functionality (24%), or use of deprecated cryptographic primitives (25%) on in total 92% of the reachable deployments. Furthermore, we discover several hundred devices in multiple autonomous systems sharing the same security certificate, opening the door for impersonation attacks. Overall, in this paper, we highlight commonly found security misconfigurations and underline the importance of appropriate configuration for security-featuring protocols.
industrial communication; network security; security configuration
internet-of-production, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-dahlmanns-imc-opcua.pdf
ACM
Proceedings of the Internet Measurement Conference (IMC '20), October 27-29, 2020, Pittsburgh, PA, USA
Pittsburgh, PA, USA
ACM Internet Measurement Conference 2020
October 27-29, 2020
978-1-4503-8138-3/20/10
10.1145/3419394.3423666
1
MarkusDahlmanns
JohannesLohmöller
Ina BereniceFink
JanPennekamp
KlausWehrle
MartinHenze
inproceedings
2020-schemmel-porse
Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
2020
7
symbiosys
https://arxiv.org/pdf/2005.06688.pdf
https://arxiv.org/abs/2005.06688
Computer Aided Verification (CAV 2020)
32nd International Conference on Computer Aided Verification
10.1007/978-3-030-53288-8_18
1
DanielSchemmel
JulianBüning
CésarRodríguez
DavidLaprell
KlausWehrle
article
2020_gleim_factDAG
FactDAG: Formalizing Data Interoperability in an Internet of Production
IEEE Internet of Things Journal
2020
4
14
7
4
3243-3253
In the production industry, the volume, variety and velocity of data as well as the number of deployed protocols increase exponentially due to the influences of IoT advances. While hundreds of isolated solutions exist to utilize this data, e.g., optimizing processes or monitoring machine conditions, the lack of a unified data handling and exchange mechanism hinders the implementation of approaches to improve the quality of decisions and processes in such an interconnected environment.
The vision of an Internet of Production promises the establishment of a Worldwide Lab, where data from every process in the network can be utilized, even interorganizational and across domains. While numerous existing approaches consider interoperability from an interface and communication system perspective, fundamental questions of data and information interoperability remain insufficiently addressed.
In this paper, we identify ten key issues, derived from three distinctive real-world use cases, that hinder large-scale data interoperability for industrial processes. Based on these issues we derive a set of five key requirements for future (IoT) data layers, building upon the FAIR data principles. We propose to address them by creating FactDAG, a conceptual data layer model for maintaining a provenance-based, directed acyclic graph of facts, inspired by successful distributed version-control and collaboration systems. Eventually, such a standardization should greatly shape the future of interoperability in an interconnected production industry.
Data Management; Data Versioning; Interoperability; Industrial Internet of Things; Worldwide Lab
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-iotj-iop-interoperability.pdf
IEEE
2327-4662
10.1109/JIOT.2020.2966402
1
LarsGleim
JanPennekamp
MartinLiebenberg
MelanieBuchsbaum
PhilippNiemietz
SimonKnape
AlexanderEpple
SimonStorms
DanielTrauth
ThomasBergs
ChristianBrecher
StefanDecker
GerhardLakemeyer
KlausWehrle
article
2020-wehrle-digitalshadows
Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus
Der Profilbereich "Information & Communication Technology"
2020
0179-079X
10.18154/RWTH-2021-02496
MatthiasJarke
Wilvan der Aalst
ChristianBrecher
MatthiasBrockmann
IstvánKoren
GerhardLakemeyer
BernhardRumpe
GüntherSchuh
KlausWehrle
MartinaZiefle
inproceedings
2019_delacadena_countermeasure
POSTER: Traffic Splitting to Counter Website Fingerprinting
2019
11
12
2533-2535
Website fingerprinting (WFP) is a special type of traffic analysis, which aims to infer the websites visited by a user. Recent studies have shown that WFP targeting Tor users is notably more effective than previously expected. Concurrently, state-of-the-art defenses have been proven to be less effective. In response, we present a novel WFP defense that splits traffic over multiple entry nodes to limit the data a single malicious entry can use. Here, we explore several traffic-splitting strategies to distribute user traffic. We establish that our weighted random strategy dramatically reduces the accuracy from nearly 95% to less than 35% for four state-of-the-art WFP attacks without adding any artificial delays or dummy traffic.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-delacadena-splitting-defense.pdf
ACM
Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom
London, United Kingdom
November 11-15, 2019
978-1-4503-6747-9/19/11
10.1145/3319535.3363249
1
WladimirDe la Cadena
AsyaMitseva
JanPennekamp
JensHiller
FabianLanze
ThomasEngel
KlausWehrle
AndriyPanchenko
inproceedings
2019-glebke-wirelessgain
Enabling Wireless Network Support for Gain Scheduled Control
2019
3
25
reflexes,spp
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf
ACM
In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
Dresden, Germany
International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
25.03.2019
10.1145/3301418.3313943
1
SebastianGallenmüller
RenéGlebke
StephanGünther
EricHauser
MauriceLeclaire
StefanReif
JanRüth
AndreasSchmidt
GeorgCarle
ThorstenHerfet
WolfgangSchröder-Preikschat
KlausWehrle
inproceedings
2018-hiller-ic2e-cpplintegration
Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud
2018
4
19
241-249
ssiclops,iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf
https://ieeexplore.ieee.org/document/8360335
IEEE
Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA
Orlando, Florida, USA
2018 IEEE International Conference on Cloud Engineering (IC2E 2018)
2018-04-19
978-1-5386-5008-0
10.1109/IC2E.2018.00050
1
JensHiller
MaelKimmerlin
MaxPlauth
SeppoHeikkila
StefanKlauck
VilleLindfors
FelixEberhardt
DariuszBursztynowski
Jesus LlorenteSantos
OliverHohlfeld
KlausWehrle
inproceedings
2017-liew-schemmel-fp
Floating-Point Symbolic Execution: A Case Study in N-Version Programming
2017
10
30
symbiosys
file:1848
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering
Urbana-Champaign, IL, USA
en
978-1-5386-2684-9/17
1
DanielLiew
DanielSchemmel
CristianCadar
AlastairDonaldson
RafaelZähl
KlausWehrle
inproceedings
2017-panchenko-wpes-fingerprinting
Analysis of Fingerprinting Techniques for Tor Hidden Services
2017
10
30
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-panchenko-wpes-fingerprinting.pdf
Online
ACM
Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), co-located with the 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA
en
978-1-4503-5175-1
10.1145/3139550.3139564
1
AndriyPanchenko
AsyaMitseva
MartinHenze
FabianLanze
KlausWehrle
ThomasEngel
inproceedings
2017-matzutt-mynedata
myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data
2017
1073-1084
Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.
Presentation slides are in German
Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling
mynedata_show
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf
https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf
Presentation slides
Eibl, Maximilian and Gaedke, Martin
Gesellschaft für Informatik, Bonn
INFORMATIK 2017
Chemnitz
INFORMATIK 2017
2017-09-28
English
978-3-88579-669-5
1617-5468
10.18420/in2017_109
1
RomanMatzutt
DirkMüllmann
Eva-MariaZeissig
ChristianeHorst
KaiKasugai
SeanLidynia
SimonWieninger
Jan HenrikZiegeldorf
GerhardGudergan
IndraSpiecker gen. Döhmann
KlausWehrle
MartinaZiefle
inproceedings
2016-mitseva-ccs-fingerprinting
POSTER: Fingerprinting Tor Hidden Services
2016
10
24
1766-1768
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-mitseva-ccs-fingerprinting.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989054
1
AsyaMitseva
AndriyPanchenko
FabianLanze
MartinHenze
KlausWehrle
ThomasEngel
inproceedings
2016-panchenko-ndss-fingerprinting
Website Fingerprinting at Internet Scale
2016
2
21
The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction. This attack can be performed by a local passive eavesdropper – one of the weakest adversaries in the attacker model of anonymization networks such as Tor. In this paper, we present a novel website fingerprinting attack. Based on a simple and comprehensible idea, our approach outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient. In order to evaluate the severity of the website fingerprinting attack in reality, we collected the most representative dataset that has ever been built, where we avoid simplified assumptions made in the related work regarding selection and type of webpages and the size of the universe. Using this data, we explore the practical limits of website fingerprinting at Internet scale. Although our novel approach is by orders of magnitude computationally more efficient and superior in terms of detection accuracy, for the first time we show that no existing method – including our own – scales when applied in realistic settings. With our analysis, we explore neglected aspects of the attack and investigate the realistic probability of success for different strategies a real-world adversary may follow.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-panchenko-ndss-fingerprinting.pdf
https://www.informatik.tu-cottbus.de/~andriy/zwiebelfreunde/
Internet Society
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
San Diego, CA, USA
February 21-24, 2016
978-1-891562-41-9
10.14722/ndss.2016.23477
1
AndriyPanchenko
FabianLanze
AndreasZinnen
MartinHenze
JanPennekamp
KlausWehrle
ThomasEngel
article
2016-kunz-tomacs-horizon
Parallel Expanded Event Simulation of Tightly Coupled Systems
ACM Transactions on Modeling and Computer Simulation (TOMACS)
2016
1
26
2
12:1--12:26
The technical evolution of wireless communication technology and the need for accurately modeling these increasingly complex systems causes a steady growth in the complexity of simulation models. At the same time, multi-core systems have become the de facto standard hardware platform. Unfortunately, wireless systems pose a particular challenge for parallel execution due to a tight coupling of network entities in space and time. Moreover, model developers are often domain experts with no in-depth understanding of parallel and distributed simulation. In combination, both aspects severely limit the performance and the efficiency of existing parallelization techniques.
We address these challenges by presenting parallel expanded event simulation, a novel modeling paradigm that extends discrete events with durations which span a period in simulated time. The resulting expanded events form the basis for a conservative synchronization scheme that considers overlapping expanded events eligible for parallel processing. We furthermore put these concepts into practice by implementing Horizon, a parallel expanded event simulation framework specifically tailored to the characteristics of multi-core systems. Our evaluation shows that Horizon achieves considerable speedups in synthetic as well as real-world simulation models and considerably outperforms the current state-of-the-art in distributed simulation.
Parallel discrete event simulation, Multi-core Systems, Wireless Systems, Simulation Modeling Paradigm, Conservative Synchronization
horizon
ACM
en
10.1145/2832909
1
GeorgKunz
MirkoStoffers
OlafLandsiedel
KlausWehrle
JamesGross
inproceedings
virtualcoordinate_li_lin_stoffers_gross_2015
Channel-Aware Virtual Coordinates Assignment Protocol and Routing in Multi-Hop Cognitive Radio Network
2015
5
20
http://dl.ifip.org/db/conf/networking/networking2015/1570067591.pdf
Online
IFIP
Laxenburg, Austria
Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France
Toulouse, France
en
10.1109/IFIPNetworking.2015.7145337
1
DiLi
ZhichaoLin
MirkoStoffers
JamesGross
article
2014-cheng-acta-geodyn-geomater
Use of MEMS accelerometers/inclinometers as a geotechnical monitoring method for ground subsidence
Acta Geodynamica et Geomaterialia
2014
10
8
11
4
1--12
Accelerometer and inclinometer are inertial sensors capable of measuring corresponding magnitude of Earth gravitational field along the direction of each axis. By means of rotation matrices related to inertial navigation methods, the output values of a three-dimensional accelerometer or a two-dimensional inclinometer can be transformed and processed into the azimuth and dip angle of the monitored target. With the rapid growth in development and cost reduction of Micro Electro Mechanical Systems (MEMS) and Wireless Sensor Network (WSN) in recent years, the engineers are able to carry out real-time wireless geotechnical monitoring during construction. In this paper, we set up a one-day measurement implemented by a self- developed wireless MEMS monitoring system on the surface in the construction site of South Hongmei Road super high way tunnel in Shanghai, by making use of rotation matrices in specific ways, the raw data are processed to expressions of three-dimensional normal vectors that represent the change of the ground. After unifying the vectors in the same coordinate system, we conduct a brief ground settlement analysis by means of an evaluation of the dip angles in the cross section and the azimuths of the sensor nodes.
http://www.irsm.cas.cz/index_en.php?page=acta_detail_doi&id=96
Online
Institute of Rock Structure and Mechanics of the ASCR, v.v.i.
Prague, Czech Republic
Online
en
2336-4351
10.13168/AGG.2014.0015
1
ChengLi
TomásFernández-Steeger
Jó AgilaBitsch Link
MatthiasMay
RafigAzzam
inproceedings
2014-mass-wirtz-mafi
High-performance, Energy-efficient Mobile Wireless Networking in 802.11 Infrastructure Mode
2014
10
fileadmin/papers/2014/2014-wirtz-mass-mafi.pdf
Online
IEEE Computer Society
Proceedings of The 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014), Philadelphia, PA, USA
Philadelphia, USA
11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014)
27 - 30 October 2014
en
978-1-4799-6035-4
10.1109/MASS.2014.21
1
HannoWirtz
GeorgKunz
JohannesLaudenberg
RobertBackhaus
KlausWehrle
proceedings
2014-kuvs-zimmermann-mindgap
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols
2014
9
29
Stuttgart
1st KuVS Workshop on Anticipatory Networks
September 29-30, 2014
1
MarcWerner
TobiasLange
MatthiasHollick
TorstenZimmermann
KlausWehrle
inproceedings
2013-ccnc-lora-gossipmule
Gossipmule: Improving Association Decisions via Opportunistic Recommendations
2013
1
11
Proceedings of the 1st Workshop on People Centric Sensing and Communications
accepted
1
Mónica AlejandraLora Girón
AlexanderPaulus
KlausWehrle
inproceedings
2013-ccncdemo-lora-gossipmule
Demo: Improving Associations in IEEE 802.11 WLANs
2013
1
Proceedings of the 10th IEEE Consumer Communications & Networking Conference, CCNC
Las Vegas, Nevada, USA
CCNC 2013 Demonstration Track
accepted
Mónica AlejandraLora Girón
AlexanderPaulus
KlausWehrle
inproceedings
Mobileoffloading_2013
Mobile Adhoc Offloading in Wireless Ad hoc Network
2013
http://arxiv.org/abs/1401.4528
Proc. of MANIAC 2013: Mobile Offloading competition
MANIAC 2013
Berlin, Germany
DiLi
AsyaMitseva
article
2012-4-alizai-wild-ijdsn
Exploiting the Burstiness of Intermediate Quality Wireless Links
International Journal of Distributed Sensor Networks (IJDSN)
2012
4
2
wld
fileadmin/papers/2012/2012-ijdsn-wld-alizai.pdf
unpublished
en
1550-1329
1
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
conference
2012-wns3-weingaertner-glebke-vodsim
Building a modular BitTorrent model for ns-3
2012
3
26
373-344
Over the past decade BitTorrent has established itself as the virtual standard for P2P file sharing in the Internet. However, it is currently not possible to investigate BitTorrent with ns-3 due to the unavailability of an according application model. In this paper we eliminate this burden. We present a highly modular BitTorrent model which allows for the easy simulation of different BitTorrent systems such as file sharing as well as present and future BitTorrent-based Video-on-Demand systems.
Best Paper Award, Best Student Paper Award
http://dl.acm.org/citation.cfm?id=2263019.2263073
ICST
Brussels, Belgium
Proceedings of the 2012 workshop on ns-3 (WNS3 2012), 26 March 2012, Desenzano del Garda, Italy
Desenzano del Garda, Italy
Proceedings of the 2012 workshop on ns-3 (WNS3 2012)
978-1-4503-1510-4
1
EliasWeingaertner
RenéGlebke
MartinLang
KlausWehrle
inproceedings
2012-lora-mobiopp-Gossipmule:ScanningandDisseminatingInformationBetweenStationsinCooperativeWLANs
Gossipmule: Scanning and Disseminating Information Between Stations in Cooperative WLANs (Poster)
2012
3
15
87-88
In Cooperative WLAN scenarios, the lack of a centralized management, the existence of many administrative domains and the current association process in wireless networks make it difficult to guarantee the quality that users expect from services and networks.
We present Gossipmule, an agent for wireless nodes that enhances the QoE perceived by users in Cooperative WLANs. Gossipmule uses mobile Crowdsensing between the wireless nodes to collect and disseminate information regarding the network. This information is used by the agent to have a more assertive association when making decisions regarding the user-AP association.
(Poster)
/fileadmin/papers/2012/2012-lora-MobiOpp12-Gossipmule.pdf
http://dl.acm.org/citation.cfm?id=2159576&CFID=88550183&CFTOKEN=31687193
Online
ACM
New York, NY, USA
Proceedings of the Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2012, Zurich, Switzerland
Zurich, Switzerland
Proceedings of the Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2012
2012-03-15
en
978-1-4503-1208-0
10.1145/2159576.2159598
1
Mónica AlejandraLora Girón
AlexanderPaulus
Jó AgilaBitsch Link
KlausWehrle
inproceedings
Li2012DySPAN
<prt>Distributed TV Spectrum Allocation for Cognitive Cellular Network under Game Theoretical Framework</prt>
2012
Proc. of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'12)
DiLi
JamesGross
inproceedings
2011-wirtz-kaleidoscope
Cooperative Wi-Fi-Sharing: Encouraging Fair Play
2011
12
14
mobile_access
fileadmin/papers/2011/2011-wirtz-kaleidoscope.pdf
Online
ITU
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
Cape Town, South Africa
ITU-T Kaleidoscope: The fully networked human?
2011-12-12
en
978-92-61-13651-2
1
HannoWirtz
RenéHummen
NicolaiViol
TobiasHeer
Mónica AlejandraLora Girón
KlausWehrle
conference
2011-lora-QoMEX-Cooperative-QoE-Abstract
QoE in Collaborative Wireless Local Area Networks
2011
9
8
One of the major’s contributions of Collaborative Wi-Fi Networks is to provide a widely distributed Wi-Fi access network in a low cost and ubiquitous way. In order to promote the participation of more actors (both Wi-Fi providers and users) and the success of this kind of emerging solutions is important to satisfy the expectations that the user has regarding the network and the services, increasing the Quality of User Experience (QoE).
As one might expect the wireless nature of the Collaborative Wi-Fi Networks imposes a set of challenges those have to be addresses in order to guarantee the QoE that the users are expecting.
In this talk, we outline research challenges encountered to improve the overall experience of the user of Collaborative Wi-Fi Networks. Our approach is to study the effect of the user´s perception firstly modifying the way that the user picks the Access Point during the Wireless Association. We highlight how an association based on the selection of the Access Point with the largest RSSI does not guarantee the satisfaction of the expectations of the users. Second, we explain how avoiding duplicate data packets downloaded in the same BSS, improving the throughput of the BSS and the QoE.
/fileadmin/papers/2011/2011-Lora-QoMex-Abstract.pdf
Online
Third International Workshop on Quality of Multimedia Experience - QoMEX 2011, Mechelen, Belgium
Mechelen, Belgium
Third International Workshop on Quality of Multimedia Experience - QoMEX 2011
September 7 - 9, 2011
Abstract
en
978-1-4577-1335-4
1
Mónica AlejandraLora Girón
inproceedings
2011-ipsn-alizai-pad
Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks
2011
4
fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf
Online
ACM
New York, NY, USA
Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA
Chicago, IL, USA
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
StefanGötz
Jó AgilaBitsch Link
KlausWehrle
inproceedings
OttHLVK2011
Floating Content: Information Sharing in Urban Areas
2011
3
21
Content sharing using personal web pages, blogs, or online social networks is a common means for people to maintain contact with their friends, colleagues, and acquaintances. While such means are essential to overcome distances, using infrastructure services for location-based services may not be desirable. In this paper, we analyze a fully distributed variant of an ephemeral content sharing service, solely dependent on the mobile devices in the vicinity using principles of opportunistic networking.
The net result is a best effort service for floating content in which: 1) information dissemination is geographically limited; 2) the lifetime and spreading of information depends on interested nodes being available; 3) content can only be created and distributed locally; and 4) content can only be added, but not explicitly deleted. First we present our system design and summarize its analytical modeling. Then we perform extensive evaluation for a map-based mobility model in downtown Helsinki to assess the operational range for floating content, which, at the same time also validate the analytical results obtained for a more abstract model of the system.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-percom-vaegs-floatingcontent.pdf
Online
IEEE
Piscataway, NJ, USA
Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, WA, USA
Seattle, USA
9th IEEE International Conference on Pervasive Computing and Communications
March 21 - 25, 2011
en
978-1-4244-9529-0
1
JörgOtt
EsaHyytiä
PasiLassila
TobiasVaegs
JussiKangasharju
inproceedings
Li2011ICC
<prt>Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access</prt>
2011
1 -6
Proc. of IEEE International Conference on Communications (ICC'11)
DiLi
JamesGross
inproceedings
2010-krebs-Globecom10-clustering-mesh-conference
Topology Stability-Based Clustering for Wireless Mesh Networks
2010
12
1
1-5
In the past, many clustering algorithms for ad-hoc networks have been proposed. Their main objective is to solve the scalability issue of ad-hoc networks by grouping nodes into clusters. The challenge in MANETs for those clustering algorithms is to cope with the high node mobility which affects the stability of the cluster structures. Wireless mesh networks consist of a static backbone and a number of mobile nodes. In the backbone of a wireless mesh network the topology is relatively static. However, topology changes occur due to frequent link losses and temporary link instability. Due to the static nature of the backbone, mobility-based approaches are not suitable in this case. In this paper, we state the important aspects for stable clustering in wireless mesh networks with unidirectional links based on the investigation of a 45-node wireless mesh testbed. We analyze well-known clustering algorithms and their performance in a large-scale testbed. Finally, we propose a new clustering algorithm called Stable Link Clustering Algorithm (SLCA).
fileadmin/papers/2010/2010-lora-clustering-MESH.pdf
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5683417
Print
IEEE
Proceedings of the IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, USA
Miami, FL, USA
IEEE Global Telecommunications Conference, GLOBECOM 2010
6 - 10 December 2010
en
978-1-4244-5636-9
10.1109/GLOCOM.2010.5683417
1
MartinKrebs
AndréStein
Mónica AlejandraLora Girón
inproceedings
2010-lora-CoNEXTStudent-ELA-Workshop
Experience Level Agreements in Wireless Metropolitan Area Sharing Networks
2010
11
1
Nowadays, mobile wireless users are in constant demand of connectivity.
Satisfying the connectivity requirements of the users requires a large amount of Access Points (APs) in order to enlarge the wireless service coverage. Wireless Metropolitan Area Sharing Networks (WMSN) are a low cost alternative that fulfill this high degree of user requirements.
On WMSN certain places will experiment congestion when a large number of users are associated with the same device. For this reason, new mechanisms are required with the aim of satisfy the Quality of User Experience (QoE).
The Experience Level Agreements (ELA) definition for WMSN is a formal way to characterize the requirements of the users and permits having measuring functions for this kind of network, which helps to improve the QoE.
fileadmin/papers/2010/2010-lora-agreements-WMSN.pdf
http://portal.acm.org/citation.cfm?doid=1921206.1921215
Digital
ACM
New York, NY, USA
Proceedings of the ACM CoNEXT 2010 Student Workshop, Philadelphia, USA
Philadelphia, PA, USA
Proceedings of the ACM CoNEXT 2010 Student Workshop
November 30 - December 03, 2010
en
978-1-4503-0468-9
10.1145/1921206.1921215
1
Mónica AlejandraLora Girón
inproceedings
2010-kunz-mascots-horizon
Expanding the Event Horizon in Parallelized Network Simulations
2010
8
18
172-181
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.
horizon
fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA
Miami, FL, USA
18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)
August 17-19, 2010
en
978-0-7695-4197-6
1526-7539
10.1109/MASCOTS.2010.26
1
GeorgKunz
OlafLandsiedel
JamesGross
StefanGötz
FarshadNaghibi
KlausWehrle
inproceedings
2010-lora-algosyn-QoE-dagstuhl
QoE in Cooperative Wireless Networks
2010
6
1
20
Cooperative Wireless Networks (CWN) have become an attrac- tive alternative for providing ubiquitous and inexpensive connectivity for the mobile users. In CWN certain public and popular spaces may facilitate the appearance of the problem of sporadic user congestion; the occurrence of this local congestion adversely impacts the network and the user, degrading the application throughput, therefore the Quality of User Experience (QoE).
fileadmin/papers/2010/2010-lora-Dagstuhl-Proposal-QoE.pdf
Print
DFG Research Training Group 1298 "AlgoSyn"
DFG Research Training Group 1298 "AlgoSyn"
Proceeedings of the Joint Workshop of the German Research Training Groups in Computer Science Dagstuhl 2010
RWTH Aachen University
Dagstuhl, Germany
Workshop of the German Research Training Groups in Computer Science
May 31 - June 2, 2010
en
3-86130-146-6
Mónica AlejandraLora Girón
inproceedings
icc2010vpsim
Towards Network Centric Development of Embedded Systems
2010
5
23
1-6
Nowadays, the development of embedded system hardware and related system software is mostly carried out using virtual platform environments. The high level of modeling detail (hardware elements are partially modeled in a cycle-accurate fashion) is required for many core design tasks. At the same time, the high computational complexity of virtual platforms caused by the detailed level of simulation hinders their application for modeling large networks of embedded systems. In this paper, we propose the integration of virtual platforms with network simulations, combining the accuracy of virtual platforms with the versatility and scalability of network simulation tools. Forming such a hybrid toolchain facilitates the detailed analysis of embedded network systems and related important design aspects, such as resource effectiveness, prior to their actual deployment.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-schuermans-weingaertner-network_centric.pdf
Online
IEEE
Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23-27
en
978-1-4244-6402-9
1550-3607
10.1109/ICC.2010.5502185
1
StefanSchürmanns
EliasWeingaertner
TorstenKempf
GerdAscheid
KlausWehrle
RainerLeupers
inproceedings
2010-lora-COOP-Cooperative-WLAN-Workshop
A Proposal for QoE in Cooperative Wireless Local Networks
2010
5
7 number 1
151-161
Cooperative Wireless Networks (CWN) have become an attractive alternative for providing ubiquitous and inexpensive connectivity to mobile users. In a CWN, some hot-spot areas may experience the problem of sporadic congestions. The appearance of this localized congestion adversely impacts the network performance in terms of effective throughput, leading to a Quality of User Experience (QoE) degradation.
The challenge then is how to ensure the QoE for the access to services, in this unplanned type of networks.
This paper proposes a QoE for CWN with no centralized entities, which is based on the IEEE 802.11e amendment to the IEEE 802.11 Standard, and employs a game theory approach. The proposed scheme permits the distribution of the load between different Access Points. It also provides to the users a mechanism for the selection of the best Access Point in order to satisfy their requirements, and to guarantee the equilibrium in the network.
fileadmin/papers/2010/2010-lora-QoE-Cooperative.pdf
Online
Gunnar Stevens, Volkmar Pipek and Markus Rohde
IISI - International Institute for Socio-Informatics
Bonn, Germany
Workshop Proceedings of 9th International Conference on the Design of Cooperative Systems, International reports on socio-informatics, Aix - en - Provence, France
Aix-en-Provence, France
Mobile Collaboration Systems: Challenges for design, work practice, infrastructure, and business
May 2010
en
1861-4280
1
Mónica AlejandraLora Girón
inproceedings
2010-ipsn-sasnauskas-kleenet
KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment
2010
4
12
186--196
Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.
automated protocol testing, experimentation, failure detection, wireless sensor networks
kleenet
fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf
Print
ACM
New York, NY, USA
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
en
978-1-60558-988-6
http://doi.acm.org/10.1145/1791212.1791235
1
RaimondasSasnauskas
OlafLandsiedel
Muhammad HamadAlizai
CarstenWeise
StefanKowalewski
KlausWehrle
inproceedings
20104-IPSN-alizai-svr
Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks
2010
4
12
366-367
We present Statistical Vector Routing (SVR), a protocol that efficiently deals with communication link dynamics in wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.
wld
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf
http://portal.acm.org/citation.cfm?id=1791257
Print
ACM
New York, NY, USA
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
Stockholm, Sweden
9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
April 12-16, 2010
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
RaimondasSasnauskas
KlausWehrle
incollection
2010-kunz-simtools-deployments
From Simulations to Deployments
2010
4
83-97
Print
Klaus Wehrle and Mesut Günes and James Gross
Springer
Berlin, Germany
6
Modeling and Tools for Network Simulation
en
978-3-642-12330-6
1
GeorgKunz
OlafLandsiedel
GeorgWittenburg
inbook
2010-02-book-alizai-hardware-and-systems
Tools and Modeling Approaches for Simulating Hardware and Systems
2010
2
1
99-117
http://www.network-simulation.info/
http://www.amazon.com/Modeling-Tools-Network-Simulation-Wehrle/dp/3642123309
Print
Springer LNCS
Chapter 7
Modeling and Tools for Network Simulation
EN
978-3-642-12330-6
Muhammad HamadAlizai
LeiGao
TorstenKempf
OlafLandsiedel
inproceedings
inproceedingsreference201001227195395138
Iterative Source-Channel Decoding with Cross-Layer Support for Wireless VoIP
2010
1
18
1
1-6
This paper presents a cross-layer approach for iterative source-channel decoding (ISCD) in wireless VoIP networks. The novelty of the proposed method is the incorporation of both, speech bits as well as protocol header bits, into the ISCD process. The header bits take the role of pilot bits having perfect reliability. These bits are distributed over the frame as strong supporting points for the MAP decoder which results in a significant enhancement of the output speech quality compared to the benchmark scheme using ISCD for speech only. For this approach, we exploit new cross-layer concepts that support the direct communication between non-adjacent layers. These concepts enable the iterative exchange of extrinsic information between the source decoder located on the application layer and the channel decoder located on the physical layer. This technique can also be applied to audio and video transmission.
refector
fileadmin/papers/2010/2010-01-scc-breddermann-iscd.pdf
CD-ROM / DVD-ROM
Rudolf Mathar, Christoph Ruland
VDE Verlag
Berlin, Germany
Proceedings of International ITG Conference on Source and Channel Coding
Proceedings of International ITG Conference on Source and Channel Coding
ITG
Siegen
International ITG Conference on Source and Channel Coding 2010
January 18-21, 2010
en
978-3-8007-3211-1
1
TobiasBreddermann
HelgeLueders
PeterVary
IsmetAktas
FlorianSchmidt
inbook
2010-kai-wifi
Creating a Wireless LAN Standard: IEEE 802.11
2010
53-109
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
print
W. Lemstra; J. Groenewegen; V. Hayes
Cambridge University Press
Cambridge, UK
3
The Innovation Journey of WiFi
9780521199711
KaiJakobs
WolterLemstra
VicHayes
BruceTuch
CessLinks
inproceedings
20105munawardynamictinyos
Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks
2010
1-6
Long-term deployments of sensor networks in physically inaccessible environments make remote re-programmability of sensor nodes a necessity. Ranging from full image replacement to virtual machines, a variety of mechanisms exist today to deploy new software or to fix bugs in deployed systems. However, TinyOS - the current state of the art sensor node operating system - is still limited to full image replacement as nodes execute a statically-linked system-image generated at compilation time. In this paper we introduce Dynamic TinyOS to enable the dynamic exchange of software components and thus incrementally update the operating system and its applications. The core idea is to preserve the modularity of TinyOS, i.e. its componentization, which is lost during the normal compilation process, and enable runtime composition of TinyOS components on the sensor node. The proposed solution integrates seamlessly into the system architecture of TinyOS: It does not require any changes to the programming model of TinyOS and existing components can be reused transparently. Our evaluation shows that Dynamic TinyOS incurs a low performance overhead while keeping a smaller - upto one third - memory footprint than other comparable solutions.
fileadmin/papers/2010/2010-05-icc-munawar-DynamicTinyOS.pdf
Online
IEEE
Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa
en
978-1-4244-6402-9
1550-3607
1
WaqaasMunawar
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
inproceedings
2010-ARCS-alizai-promotingpower
Promoting Power to a First Class Metric in Network Simulations
2010
387-392
Accurate prediction of energy consumption early in the design process is essential to efficiently optimize algorithms and protocols. However, despite energy efficiency gathering significant attention in networking research, limited effort has been invested in providing requisite evaluation tools and models. Hence, developers demand powerful evaluation tools to assist them in comparing new communication paradigms in terms of energy efficiency, and minimizing the energy requirements of algorithms. In this paper, we argue for promoting energy to a first class metric in network simulations. We explore the challenges involved in modelling energy in network simulations and present a detailed analysis of different modelling techniques. Finally, we discuss their applicability in high-level network simulations.
fileadmin/papers/2010/2010-2-ARCS-alizai-promoting-power.pdf
Print
VDE-VERLAG
Berlin, Germany
Proceedings of the Workshop on Energy Aware Systems and Methods, in conjunction with GI/ITG ARCS 2010 Hannover, Feb. 21-23
en
978-3-8007-3222-7
1
Muhammad HamadAlizai
GeorgKunz
OlafLandsiedel
KlausWehrle
phdthesis
2010-landsiedel-phd
Mechanisms, Models, and Tools for Flexible Protocol Development and Accurate Network Experimentation
2010
RWTH Aachen University
OlafLandsiedel
inproceedings
2009-sensys-alizai-burstytraffic
Bursty Traffic over Bursty Links
2009
11
71-84
wld
fileadmin/papers/2009/2009-alizai-sensys-bre.pdf
ACM
New York, NY, USA
Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA
Berkley, California
Sensys 09
November 2009
en
978-1-60558-519-2
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
inproceedings
2009-kunz-mascots-horizon
Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation
2009
9
21
575-577
This paper presents Horizon, an extension to network simulation that enables the efficient and detailed simulation of wireless networks. Our contributions are two-fold as Horizon provides i) an API for accurately modeling processing time of discrete event simulation models by augmenting events with time spans and ii) a lightweight parallelization scheme that utilizes timing information to guide the parallel execution of simulations on multi-core computers. In this paper we primarily focus on the latter.
horizon
fileadmin/papers/2009/2009-kunz-mascots-horizon.pdf
Poster
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), London, UK
London, Great Britain
17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09)
September 21-32, 2009
en
978-1-4244-4926-2
1526-7539
10.1109/MASCOT.2009.5366710
1
GeorgKunz
OlafLandsiedel
KlausWehrle
techreport
200908munawarfgsndynamictinyos
Remote Incremental Adaptation of Sensor Network Applications
2009
9
9-12
fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf
http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
Technical University Hamburg
en
WaqaasMunawar
OlafLandsiedel
Muhammad HamadAlizai
KlausWehrle
techreport
200908alizaifgsnburstyrouting
Routing Over Bursty Wireless Links
2009
9
63-66
Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.
wld
fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf
doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
en
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
inproceedings
2009-landsiedel-visa-vipe
A Virtual Platform for Network Experimentation
2009
8
17
45--52
Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive.
In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.
deployment, network experimentation, resource virtualization, simulation
fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf
Print
ACM Press
New York, NY, USA
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain
Barcelona, Spain
1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures
August 17, 2009
en
978-1-60558-595-6
10.1145/1592648.1592657
1
OlafLandsiedel
GeorgKunz
StefanGötz
KlausWehrle
poster
2009-kunz-nsdi-profab
Poster Abstract: Protocol Factory: Reuse for Network Experimentation
2009
4
22
fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf
Poster
Online
USENIX Association
Berkeley, CA, USA
6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)
en
1
GeorgKunz
OlafLandsiedel
StefanGötz
KlausWehrle
article
2009AlizaiPIKtimingenergy
Modelling Execution Time and Energy Consumption in Sensor Node Simulation
PIK Journal, Special Issue on Energy Aware Systems
2009
2
32
2
127-132
fileadmin/papers/2009/2009-2-alizai-modeling-energy.pdf
Print
en
0930-5157
1
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
techreport
2008-fgsn-alizai-stle
Challenges in Short-term Wireless Link Quality Estimation
2008
7
27-30
wld
fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf
ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf
Print
Fachbereich Mathematik und Informatik
Berlin, Germany
Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks
FGSN 08
September 2010
en
1
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
AlexanderBecher
inproceedings
2008-becher-hotemnets-linkestimation
Towards Short-Term Wireless Link Quality Estimation
2008
6
3
1--5
Commonly, routing in sensor networks is limited to longterm stable links. Unstable links, although often promising to be of large routing progress, are not considered for packet forwarding as link estimators typically cannot handle their dynamics. In this paper we introduce short-term link estimation to capture link dynamics at a high resolution in time and to identify when these render a link temporarily reliable or unreliable. We identify such dynamics based on packet overhearing, predict short-term availability and unavailability, and adapt neighbor tables, thereby enlarging the set of links useable by any routing algorithm. Additionally, we show that short-term link estimation integrates seamlessly into today's sensor network link estimators and routing protocols.
wld
fileadmin/papers/2008/2008-becher-hotemnets-linkestimation.pdf
Online
ACM Press
New York, NY, USA
Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Charlottesville, VA, USA
Chalottesville, USA
Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08)
June 2-3, 2008
en
978-1-60558-209-2
1
AlexanderBecher
OlafLandsiedel
GeorgKunz
KlausWehrle
inproceedings
200804landsiedelIPSN08TimingMatters
When Timing Matters: Enabling Time Accurate & Scalable Simulation of Sensor Network Applications
2008
344-354
The rising complexity of data processing algorithms in sensor networks combined with their severely limited computing power necessitates an in-depth understanding of their temporal behavior. However, today only cycle accurate emulation and test-beds provide a detailed and accurate insight into the temporal behavior of sensor networks. In this paper we introduce fine grained, automated instrumentation of simulation models with cycle counts derived from sensor nodes and application binaries to provide detailed timing information. The presented approach bridges the gap between scalable but abstracting simulation and cycle accurate emulation for sensor network evaluation. By mapping device-specific code with simulation models, we can derive the time and duration a certain code line takes to get executed on a sensor node. Hence, eliminating the need to use expensive instruction-level emulators with limited speed and restricted scalability. Furthermore, the proposed design is not bound to a specific hardware platform, a major advantage compared to existing emulators. Our evaluation shows that the proposed technique achieves a timing accuracy of 99% compared to emulation while adding only a small overhead. Concluding, it combines essential properties like accuracy, speed and scalability on a single simulation platform.
fileadmin/papers/2008/2008-04-IPSN-2008-landsiedel-Timing-Matters.pdf
Print
IEEE Computer Society
Washington, DC, USA
Proceedings of the 7th ACM International Conference on Information Processing in Sensor Networks (IPSN 2008), St. Louis, MO, USA
en
978-0-7695-3157-1
1
OlafLandsiedel
Muhammad HamadAlizai
KlausWehrle
inproceedings
2007-heer-pisa
PISA: P2P Wi-Fi Internet Sharing Architecture
Seventh IEEE International Conference on Peer-to-Peer Computing, P2P 2007
2007
9
2
1
251-252
http://www.comsys.rwth-aachen.de/fileadmin/papers/2007/2007-p2p-heer-pisa.pdf
Print
IEEE
Washington, DC, USA
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing, 2007. P2P 2007, Galway, Ireland.
Galway, Ireland
Seventh IEEE International Conference on Peer-to-Peer Computing, 2007. P2P 2007.
en
978-0-7695-2986-8
10.1109/P2P.2007.12
1
TobiasHeer
ShaohuiLi
KlausWehrle
techreport
2007-fgsn-alizai-timetossim
Accurate Timing in Sensor Network Simulations
2007
7
fileadmin/papers/2008/2007-07-fgsn-alizai-accurate-timing.pdf
https://www.ds-group.info/events/fgsn07/fgsn07proc.pdf
Print
RWTH Aachen
Aachen, Germany
Proceedings of the 6th GI/ITG KuVS Workshop on Wireless Sensor Networks (FGSN 07)
RWTH Aachen
Aachen, Germany
FGSN 07
July 2007
en
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
article
200707ITp2p
Peer-to-Peer Systems (Editorial)
Special Issue on Peer-to-Peer of the it - Information Technology Journal
2007
49
ISSN 0935-3232
http://it-Information-Technology.de
RalfSteinmetz
KlausWehrle
NicolasLiebau
article
LandsiedelEtAl2007
MHT: A Mobility-Aware Distributed Hash Table
Special Issue on Peer-to-Peer of the it - Information Technology Journal
2007
49
5
298-303
Mobile ad-hoc networks and distributed hash tables share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we discuss practical challenges such as Churn, load balacing and security of the Mobile Hash Table. A special focus is put on the differences and new challenges that the use of a DHT in a mobile environment poses.
http://it-Information-Technology.de
Print
Oldenbourg Verlag
Munich, Germany
en
1611-2776
1
OlafLandsiedel
TobiasHeer
KlausWehrle
inbook
2007landsiedelwsnalgpseudo
Pseudo Geometric Routing in Sensor Networks
2007
203-213
http://www.springer.com/computer/communications/book/978-3-540-74990-5
Dorothea Wagner, Roger Wattenhofer
Springer
Lecture Notes in Computer Science, Theoretical Computer Science and General Issues
11
Algorithms for Sensor and Ad-Hoc Networks
OlafLandsiedel
conference
200711Globecom2007Landsiedelmultipathonionrouting
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
2007
Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing a static tunnel through an overlay network is build via layered encryption. All traffic exchanged by its end points is relayed through this tunnel.In contrast, this paper introduces dynamic multipath Onion Routing to extend the static Onion Routing paradigm. This approach allows each packet exchanged between two end points to travel along a different path. To provide anonymity the first half of this path is selected by the sender and the second half by the receiver of the packet. The results are manifold: First, dynamic multipath Onion Routing increases the resilience against threats, especially pattern and timing based analysis attacks. Second, the dynamic paths reduce the impact of misbehaving and overloaded relays. Finally, inspired by Internet routing, the forwarding nodes do not need to maintain any state about ongoing flows and so reduce the complexity of the router. In this paper, we describe the design of our dynamic Multipath Onion Router (MORE) for peer-to-peer overlay networks, and evaluate its performance. Furthermore, we integrate address virtualization to abstract from Internet addresses and provide transparent support for IP applications. Thus, no application-level gateways, proxies or modifications of applications are required to sanitize protocols from network level information. Acting as an IP-datagram service, our scheme provides a substrate for anonymous communication to a wide range of applications using TCP and UDP.
IEEE Global Communication Conference (GlobeCom), Washington D.C.
OlafLandsiedel
AlexisPimenidis
KlausWehrle
HeikoNiedermayer
GeorgCarle
inproceedings
200706juriFGSN07platform
Simulation von plattformunabhängigen TinyOS-Applikationen mit ns-2
2007
Aachen, Germany
Proceedings of 6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks"
JuriSaragazki
OlafLandsiedel
KlausWehrle
inproceedings
200707SchmidtFGSN07composition
Smart Composition of Sensor Network Applications
2007
Aachen, Germany
Proceedings of 6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Aachen
StefanSchmitz
OlafLandsiedel
KlausWehrle
inproceedings
200606LandsiedelRatWatch
Rat Watch: Using Sensor Networks for Animal Observation
2006
6
19
1
1--2
In an attempt to employ sensor network technology for animal observation, in particular of wild rats, we identified several restrictive shortcomings in existing sensor network research, which we discuss in this paper.
(Poster and Abstract)
RatPack
fileadmin/papers/2006/2006-06-Landsiedel-RatWatch.pdf
http://www.sics.se/realwsn06/program.html
Online
Pedro José Marron and Thiemo Voigt
SICS
Uppsala, Sweden
ACM Workshop on Real-World Wireless Sensor Networks (RealWSN) in conjunction with ACM MobiSys, Uppsala, Sweden
ACM
Uppsala, Sweden
ACM Workshop on Real-World Wireless Sensor Networks, REALWSN'06
June 19, 2006
en
1
OlafLandsiedel
Jó AgilaBitsch Link
KlausWehrle
JohannesThiele
HanspeterMallot
inproceedings
200602LandsiedelEWSNModularSN
Modular Communication Protocols for Sensor Networks
2006
2
13
507
22 -- 23
In this paper we present our ongoing work on modular communication protocols for sensor networks. Their modularity allows recomposing a protocol dynamically at runtime and adapting it to the changing needs of a sensor network. Compared to existing work, our componentization is fine grained and protocol independent, enabling a high degree of component reusability.
(Poster and Abstract)
fileadmin/papers/2006/2006-02-Landsiedel-EWSN-ModularSN.pdf
ftp://ftp.inf.ethz.ch/pub/publications/tech-reports/5xx/507.pdf
Technical Report
Online
Kay Römer and Holger Karl and Friedemann Matterns
Department of Computer Science, ETH Zurich
Zurich, Switzerland
Technical Report ETH Zurich / Dept. of Computer Science
European Workshop on Wireless Sensor Networks (EWSN 2006), Zurich Switzerland
EWSN
Zurich, Switzerland
3rd European Workshop on Wireless Sensor Networks (EWSN 2006)
February 13-15, 2006
en
1
OlafLandsiedel
Jó AgilaBitsch Link
KatharinaDenkinger
KlausWehrle
conference
200607landsiedelfgsnmodular
When Modularity Matters
2006
In an attempt to employ sensor network technology for animal observation, in particular of wild rats, we identified several restrictive shortcomings in existing sensor network research. In this paper, we present modular and flexible communication protocols as an efficient substrate to address these shortcomings. Their modularity allows recomposing a protocol dynamically at runtime and adapting it to the changing needs of a deployed sensor network.
5th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Stuttgart, Germany
OlafLandsiedel
KlausWehrle
conference
200607landsiedelngimodels
Towards flexible and modular simulation models
2006
In this talk we discuss the increasing need for flexible and modular simulation models and our ongoing work in this area. Although a huge number of simulation models are available today, these models do not interoperate and cannot be easily combined to form a full protocol simulation stack.
Visions of Future Generation Networks, Würzburg, Germany
OlafLandsiedel
LeoPetrak
KlausWehrle
inproceedings
200605NSDIOCALA
OCALA: An Architecture for Supporting Legacy Applications over Overlays
2006
In order for overlays and new network architectures to gain real user acceptance, users should be able to leverage overlay functionality without any modifications to their applications and operating systems. We present our design, implementation, and experience with OCALA, an overlay convergence architecture that achieves this goal. OCALA interposes an overlay convergence layer below the transport layer. This layer is composed of an overlay independent sub-layer that interfaces with legacy applications, and an overlay dependent sub-layer that delivers packets to the overlay. Unlike previous efforts, OCALA enables: (a) simultaneous access to multiple overlays (b) communication between hosts in different overlays (c) communication between overlay hosts and legacy hosts (d) extensibility, allowing researchers to incorporate their overlays into OCALA. We currently support five overlays, i3 [32], RON [1], HIP [19], DOA [39] and OverDoSe [31] on Linux, Windows XP/2000 and Mac OS X. We (and a few other research groups and end-users) have used OCALA for over a year with many legacy applications ranging from web browsers to remote desktop applications.
San Jose, California
USENIX / ACM
Proceedings of 3rd ACM Sigcomm/ACM Sigops Symposium on Networked Systems Design and Implementation (NSDI 2006)
ACM
Dilip AJoseph
KarthikLakshminarayanan
IonStoica
KlausWehrle
inproceedings
200608landsiedelp2p06scalablemobility
Towards Scalable Mobility in Distributed Hash Tables
2006
203-209
For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, we explore how DHTs and mobile ad-hoc networks (MANETs) fit together. We argue that both share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we argue that with little global knowledge, such as a map of the city or whatever area the nodes move in, one can even further improve the scalability and reduce DHT maintenance overhead significantly, allowing MHT to scale up to several ten thousands of nodes.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2006/2006-landsiedel-p2p-mobility.pdf
print
IEEE
Washington, DC, USA
print
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), Cambridge, UK
IEEE
Cambridge, UK
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06)
2006-09-06
en
0-7695-2679-9
10.1109/P2P.2006.46
1
OlafLandsiedel
StefanGötz
KlausWehrle
inproceedings
landsiedel2005anonymous
Anonymous IP-Services via Overlay Routing
2005
3
Although research provides anonymous Internet communication schemes,
anonymous IP-services received only limited attention. In this paper
we present SARA (Anonymous Overlay Routing Providing Sender And
Receiver Anonymity), which enables sender, receiver and relationship
anonymity using layered encryption and distributed traffic mixes,
similar to a Chaumian Mix. Via IP-datagram service and address
virtualization it is fully transparent to applications. Organized as
structured Peer-To-Peer system, SARA is highly scalable and fault
tolerant.
In SARA each communication partner randomly selects a number of
nodes from the overlay and concatenates them to an anonymous
communication path. The sender selects the head of the path, the
receiver builds the tail and publishes this information in the
overlay network using an anonymous ID. Via this ID the sender
retrieves the tail nodes of the path and concatenates both path
section. Layered encryption hides the identities of the sender,
receiver and the intermediate nodes.
5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung"
Würzburg, Germany
5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung"
March 2005
OlafLandsiedel
SimonRieche
HeikoNiedermayer
KlausWehrle
GeorgCarle
article
200504landsiedelpikenergy
Enabling Detailed Modeling and Analysis of Sensor Networks
Special Issue on Sensor Networks, PIK Journal
2005
28
2
Simulation is the de-facto standard tool for the evaluation of distributed and communication systems like sensor networks. Most simulation efforts focus on protocol- and algorithm-level issues, thus depending on the right choice and configuration of models. However, as such models commonly neglect time dependent issues, many research challenges, like energy consumption and radio channel utilization still remain. In this article we present two new tools to model and analyze sensor networks: Avrora, a fast and accurate sensor network simulator, and AEON, a novel tool built on top of Avrora, to evaluate the energy consumption and to accurately predict the lifetime of sensor networks. Avrora is a highly scalable instruction-level simulator for sensor network programs. It simulates the execution of the program down to the level of individual clock cycles, a time quantum of about 135 ns. By incorporating state of the art simulation techniques, including an efficiently maintained event queue, fast-forward through sleep-time, and parallel simulation, it can simulate entire networks of nodes in real time. AEON's energy model is based on Avrora and makes use of the cycle accurate execution of sensor node applications for precise energy measurements. Due to limited energy resources, power consumption is a crucial characteristic of sensor networks. AEON uses accurate measurements of node current draw and the execution of real code to enable accurate prediction of the actual power consumption of sensor nodes. Consequently, it prevents erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency. Thus, it enables a highly precise estimation of the overall lifetime of a sensor network.
OlafLandsiedel
KlausWehrle
Ben LTitzer
JensPalsberg
conference
200509petraksoftcommobility
Towards Realistic Strategy-Based Mobility Models for Ad Hoc Communication
2005
Proceedings of the 2005 Conference on Software for Communication Systems and Computer Networks
LeoPetrak
OlafLandsiedel
KlausWehrle
conference
200509landsiedelp2ptdht
T-DHT: Topology-Based Distributed Hash Tables
2005
In this paper, we introduce topology-based distributed hash tables (T-DHT) as an infrastructure for data-centric storage, information processing, and routing in ad hoc and sensor networks. T-DHTs do not rely on location information and work even in the presence of voids in the network. Using a virtual coordinate system, we construct a distributed hash table which is strongly oriented to the underlying network topology. Thus, adjacent areas in the hash table commonly have a direct link in the network. Routing in the T-DHT guarantees reachability and introduces low hop-overhead compared with the shortest path.
Proceedings of Fifth International IEEE Conference on Peer-to-Peer-Computing, Konstanz, Germany
OlafLandsiedel
KatharinaLehmann
KlausWehrle
inproceedings
200503landsiedelfgsnaeon
Project AEON
2005
481
72-76
Power consumption is a crucial characteristic of sensor networks and their applications, as sensor nodes are commonly battery driven. Although recent research focuses strongly on energy aware applications and operating systems, power consumption is still a limiting factor. Once sensor nodes are deployed, it is challenging and sometimes even impossible to change batteries. As a result, erroneous lifetime prediction causes high costs and may render a sensor network useless, before its purpose is fulfilled. In this paper we present AEON, a novel evaluation tool to quantitatively predict power consumption of sensor nodes and whole sensor networks. Our energy model, based on measurements of node current draw and the execution of real code, enables accurate prediction of the actual power consumption of sensor nodes. Consequently, preventing erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency.
Zürich, CH
Proceedings of the 4th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Techical Report No. 481
OlafLandsiedel
KlausWehrle
SimonRieche
StefanGötz
LeoPetrak
inproceedings
200410riechehotp2preliability
Reliability of Data in Structured Peer-to-Peer Systems
2004
10
108-113
Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. For this purpose Distributed Hash Tables (DHT) offer a highly scalable and self-organizing paradigm for efficient distribution and retrieval of data. Thereby a common assumption of P2P-Systems is, that the participating nodes are unreliable and may fail at any time. Since many of research goes into the design of DHT lookup services, these systems aim to provide a stable global addressing structure. But to storage data reliable in a DHT only few techniques were already developed. However since data has to be stored persistent in the network, it should be retrieved anytime, even if nodes fail. In this work we discuss possibilities to store data fault tolerant in a structured Peer-to-Peer system.
Print
Proceedings of HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
Volendam, Netherlands
HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer
Oct. 2004
en
1
SimonRieche
KlausWehrle
OlafLandsiedel
StefanGötz
LeoPetrak
inproceedings
200410wehrlefgpcintegriertekonstruktionsmethode
Integrierte Konstruktionsmethoden für flexible Protokolle in ubiquitären Kommunikationssystemen
2004
Stuttgart, Germany
Proceedings of the GI/ITG KuVS Fachgespräch Systemsoftware für Pervasive Computing
KlausWehrle
OlafLandsiedel
SimonRieche
StefanGötz
LeoPetrak
inproceedings
200410acmmultimediai3composition
Support for Service Composition in i3
2004
http://i3.cs.berkeley.edu
New York, USA
Proceedings of ACM Multimedia 2004
ACM
KarthikLakshminarayanan
IonStoica
KlausWehrle
techreport
200606i3proxytechreport
Supporting Legacy Applications over i3
2004
UCB/CSD-04-1342
Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique which allows the proxy to tunnel the legacy traffic over the overlay transparently. Our solution can preserve IP packet headers on an end-to-end basis, even when end-host IP addresses change, or when endhosts live in different address spaces (e.g., behind NATs). In addition, our solution allows the use of human-readable names to refer to hosts or services, and requires no changes to applications or operating systems. To illustrate how the proxy enables legacy applications to take advantage of the overlay (i.e., i3) functionality, we present four examples: enabling access to machines behind NAT boxes, secure Intranet access, routing legacy traffic through Bro, an intrusion detection system, and anonymous web download. We have implemented the proxy on Linux andWindows XP/2000 platforms, and used it over the i3 service on PlanetLab over a three month period with a variety of legacy applications ranging from web browsers to operating system-specific file sharing.
http://i3.cs.berkeley.edu
UCB, Berkeley, USA
University of California at Berkeley
Technical Report
JayanthkumarKannan
AyumuKubota
KarthikLakshminarayanan
IonStoica
KlausWehrle
article
1999-thissen-pik-management
Management verfahrenstechnischer Entwicklungswerkzeuge
Praxis der Informationsverarbeitung und Kommunikation (PIK)
1999
1
1
22-31
Print
Saur-Verlag
München, Deutschland
de
0930-5157
ClaudiaLinnhoff-Popien
SteffenLipperts
DirkThißen
inbook
1999-thissen-springer-management
Dienstmanagement und -vermittlung für Entwicklungswerkzeuge
1999
371-386
Print
M. Nagl, B. Westfechtel
Springer
Integration von Entwicklungssystemen in Ingenieuranwendungen, Substantielle Verbesserung der Entwicklungsprozesse
de
3-540-63920-9
OttoSpaniol
DirkThißen
BerndMeyer
ClaudiaLinnhoff-Popien
inproceedings
1999-thissen-DAIS-wrapper
CORBA wrappers for a-posteriori management: an approach to integrating management with existing heterogeneous systems
1999
169-174
Print
Kluwer Academic Publishers
Proceedings of the 2nd International Working Conference on Distributed Applications and Interoperable Systems (DAIS'99), Helsinki, Finland
Helsinki, Finland
2nd International Working Conference on Distributed Applications and Interoperable Systems (DAIS'99)
en
0-7923-8527-6
1
SteffenLipperts
DirkThißen
inproceedings
1999-thissen-FMOODS-trader
Assessing Service Properties with Regard to a requested QoS: The Service Metric
1999
273-280
Print
P. Ciancarini, A. Fantechi, R. Gorrieri
Kluwer Academic Publishers
Formal Methods for Open Object-Based Distributed Systems
3rd INternational Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS'99), Florence, Italy
en
0-7923-8429-6
1
ClaudiaLinnhoff-Popien
DirkThißen
inproceedings
1997-thissen-edoc-corba
Can CORBA Fulfil Data Transfer Requirements of Industrial Enterprises
1997
129-137
Print
IEEE
Proceedings of the 1st International Enterprise Distributed Object Computing Workshop (EDOC'97), Gold Coast, Australia
Gold Coast, Australia
1st International Enterprise Distributed Object Computing Workshop (EDOC'97)
en
0-8186-8031-8
1
DirkThißen
ClaudiaLinnhoff-Popien
SteffenLipperts
inproceedings
1997-thissen-iwqos-trader
Integrating QoS Restrictions into the Process of Service Selection
1997
225-236
Print
Chapman & Hall
5th IFIP International Workshop on Quality of Service (IWQOS'97), New York, USA
New York, USA
5th IFIP International Workshop on Quality of Service (IWQOS'97)
en
0412809400
1
ClaudiaLinnhoff-Popien
DirkThißen
inproceedings
1997-thissen-kivs-trader
Einbeziehung von Nutzerinteressen bei der QoS-basierten Dienstvermittlung unter CORBA
1997
236-251
Print
Springer
Proceedings der 10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97), Braunschweig, Germany
Braunschweig
10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97)
de
3-540-62565-8
1
PeterReichl
ClaudiaLinnhoff-Popien
DirkThißen
inproceedings
1996-thissen-dccn-trader
How to Enhance Service Selection in Distributed Systems
1996
114-123
Print
Proceedings of the 1st International Conference on Distributed Computer Communication Networks (DCCN'96), Tel Aviv, Isreal
Tel Aviv, Isreal
1st International Conference on Distributed Computer Communication Networks (DCCN'96)
en
PeterReichl
DirkThißen
ClaudiaLinnhoff-Popien
inproceedings
1996-thissen-treds-trader
Finding Optimal Services within a CORBA Trader
1996
200-213
Print
Springer
Proceedings of the 1st International Workshop on Trends in Distributed Systems: CORBA and Beyond (TreDS'96), Aachen
Aachen
1st International Workshop on Trends in Distributed Systems: CORBA and Beyond (TreDS'96)
en
3-540-61842-2
1
DirkThißen
ClaudiaLinnhoff-Popien