This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-09-09
Creation time: 07-25-10
--- Number of references
75
incollection
2023_pennekamp_crd-a.i
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
2023
2
8
35-60
The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_2
1
JanPennekamp
AnastasiiaBelova
ThomasBergs
MatthiasBodenbenner
AndreasBührig-Polaczek
MarkusDahlmanns
IkeKunze
MoritzKröger
SandraGeisler
MartinHenze
DanielLütticke
BenjaminMontavon
PhilippNiemietz
LuciaOrtjohann
MaximilianRudack
Robert H.Schmitt
UweVroomen
KlausWehrle
MichaelZeng
inproceedings
2022_pennekamp_cumul
CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research
2022
12
8
RWTH-2022-10811
Anonymous communication on the Internet is about hiding the relationship between communicating parties. At NDSS '16, we presented a new website fingerprinting approach, CUMUL, that utilizes novel features and a simple yet powerful algorithm to attack anonymization networks such as Tor. Based on pattern observation of data flows, this attack aims at identifying the content of encrypted and anonymized connections. Apart from the feature generation and the used classifier, we also provided a large dataset to the research community to study the attack at Internet scale. In this paper, we emphasize the impact of our artifacts by analyzing publications referring to our work with respect to the dataset, feature extraction method, and source code of the implementation. Based on this data, we draw conclusions about the impact of our artifacts on the research field and discuss their influence on related cybersecurity topics. Overall, from 393 unique citations, we discover more than 130 academic references that utilize our artifacts, 61 among them are highly influential (according to SemanticScholar), and at least 35 are from top-ranked security venues. This data underlines the significant relevance and impact of our work as well as of our artifacts in the community and beyond.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-pennekamp-cumul-artifacts.pdf
https://www.acsac.org/2022/program/artifacts_competition/
ACSA
Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA
Austin, TX, USA
38th Annual Computer Security Applications Conference (ACSAC '22)
December 5-9, 2022
10.18154/RWTH-2022-10811
1
JanPennekamp
MartinHenze
AndreasZinnen
FabianLanze
KlausWehrle
AndriyPanchenko
article
2022-henze-tii-prada
Complying with Data Handling Requirements in Cloud Storage Systems
IEEE Transactions on Cloud Computing
2022
9
10
3
1661-1674
In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and privacy concerns, complying with data handling requirements becomes a crucial property for cloud storage systems. We present Prada , a practical approach to account for compliance with data handling requirements in key-value based cloud storage systems. To achieve this goal, Prada introduces a transparent data handling layer, which empowers clients to request specific data handling requirements and enables operators of cloud storage systems to comply with them. We implement Prada on top of the distributed database Cassandra and show in our evaluation that complying with data handling requirements in cloud storage systems is practical in real-world cloud deployments as used for microblogging, data sharing in the Internet of Things, and distributed email storage.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-henze-tii-prada.pdf
Online
en
2168-7161
10.1109/TCC.2020.3000336
1
MartinHenze
RomanMatzutt
JensHiller
ErikMühmer
Jan HenrikZiegeldorf
Johannesvan der Giet
KlausWehrle
proceedings
2022-serror-cset
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
2022
8
8
5
data sets, network traffic, smart grid security, IDS
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-serror-cset-powerduck.pdf
ACM
New York, NY, USA
online
Virtual
Cyber Security Experimentation and Test Workshop (CSET 2022)
August 8, 2022
978-1-4503-9684-4/22/08
10.1145/3546096.3546102
1
SvenZemanek
ImmanuelHacker
KonradWolsing
EricWagner
MartinHenze
MartinSerror
article
2022_brauner_iop
A Computer Science Perspective on Digital Transformation in Production
ACM Transactions on Internet of Things
2022
5
1
3
2
The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.
Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf
ACM
2691-1914
10.1145/3502265
1
PhilippBrauner
ManuelaDalibor
MatthiasJarke
IkeKunze
IstvánKoren
GerhardLakemeyer
MartinLiebenberg
JudithMichael
JanPennekamp
ChristophQuix
BernhardRumpe
Wilvan der Aalst
KlausWehrle
AndreasWortmann
MartinaZiefle
inproceedings
2021_mitseva_sequences
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages
2021
11
17
2411-2413
Website fingerprinting (WFP) is a special case of traffic analysis, where a passive attacker infers information about the content of encrypted and anonymized connections by observing patterns of data flows. Although modern WFP attacks pose a serious threat to online privacy of users, including Tor users, they usually aim to detect single pages only. By ignoring the browsing behavior of users, the attacker excludes valuable information: users visit multiple pages of a single website consecutively, e.g., by following links. In this paper, we propose two novel methods that can take advantage of the consecutive visits of multiple pages to detect websites. We show that two up to three clicks within a site allow attackers to boost the accuracy by more than 20% and to dramatically increase the threat to users' privacy. We argue that WFP defenses have to consider this new dimension of the attack surface.
Traffic Analysis; Website Fingerprinting; Web Privacy
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mitseva-fingerprinting-sequences.pdf
ACM
Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea
Seoul, Korea
November 15-19, 2021
978-1-4503-8454-4/21/11
10.1145/3460120.3485347
1
AsyaMitseva
JanPennekamp
JohannesLohmöller
TorstenZiemann
CarlHoerchner
KlausWehrle
AndriyPanchenko
article
2021_schomakers_insights
Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives
Computer Law Review International
2021
2
15
22
1
8-15
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity, Privacy, European Data Protection Law
1610-7608
10.9785/cri-2021-220103
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle
inproceedings
2019_rut_schomakers_privacy
Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity
2021
1
27
857-870
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity,Privacy,European Data Protection Law
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf
https://dl.gi.de/handle/20.500.12116/34788
https://arxiv.org/abs/1911.06569
Gesellschaft für Informatik
Bonn
INFORMATIK 2020
Karlsruhe, Germany
INFORMATIK 2020
2020-09-28 to 2020-10-01
English
10.18420/inf2020_76
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle
article
2021-wehrle-energy
A Novel Receiver Design for Energy Packet‐Based Dispatching
Energy Technology
2021
9
2
10.1002/ente.202000937
1
FriedirchWiegel
EdoardoDe Din
AntonelloMonti
KlausWehrle
MarcHiller
MartinaZitterbart
VeitHagenmeyer
inproceedings
2020-kosek-tcp-conformance
MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild
2020
3
30
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf
https://arxiv.org/abs/2002.05400
Springer
Proceedings of the Passive and Active Measurement Conference (PAM '20)
Eugene, Oregon, USA
Passive and Active Measurement Conference (PAM 2020)
30.03.2020 - 31.03.2020
en
https://doi.org/10.1007/978-3-030-44081-7_8
1
MikeKosek
LeoBlöcher
JanRüth
TorstenZimmermann
OliverHohlfeld
article
2020-wehrle-digitalshadows
Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus
Der Profilbereich "Information & Communication Technology"
2020
0179-079X
10.18154/RWTH-2021-02496
MatthiasJarke
Wilvan der Aalst
ChristianBrecher
MatthiasBrockmann
IstvánKoren
GerhardLakemeyer
BernhardRumpe
GüntherSchuh
KlausWehrle
MartinaZiefle
inproceedings
2019-hiller-lcn-sessionsharing
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
2019
10
14
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-lcn-case_for_tls_session_sharing.pdf
IEEE
IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany
Osnabrück, Germany
44th IEEE Conference on Local Computer Networks (LCN)
October 14-17, 2019
en
978-1-7281-2561-9
10.1109/LCNSymposium47956.2019.9000667
1
JensHiller
MartinHenze
TorstenZimmermann
OliverHohlfeld
KlausWehrle
phdthesis
2019-tzimmermann-phd-thesis
Improving Content and Service Distribution beyond Infrastructure Upgrades
2019
9
31
https://www.shaker.de/de/content/catalogue/index.asp?lang=de&ID=8&ISBN=978-3-8440-6928-0
Shaker Verlag
Shaker Verlag, Düren, Germany
Reports on Communications and Distributed Systems
18
RWTH Aachen University
Ph.D. Thesis
en
978-3-8440-6928-0
TorstenZimmermann
techreport
2019-hohlfeld-santa-tr
Application-Agnostic Offloading of Packet Processing
2019
4
1
arXiv:1904.00671 [cs.NI]
1--14
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf
https://arxiv.org/abs/1904.00671
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
OliverHohlfeld
HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2019-rueth-icmp
Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane
2019
3
27
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf
https://arxiv.org/abs/1901.07265
Springer
In Proceedings of the Passive and Active Measurement Conference (PAM '19)
Puerto Varas, Chile
Passive and Active Measurement Conference (PAM 2019)
27.3.2018 - 29.3.2018
en
10.1007/978-3-030-15986-3_4
1
JanRüth
TorstenZimmermann
OliverHohlfeld
inproceedings
2018-zimmermann-webready
Is the Web ready for HTTP/2 Server Push?
2018
12
4
maki
https://dl.acm.org/citation.cfm?id=3281434
https://arxiv.org/abs/1810.05554
https://http2.netray.io/interleaving.html
ACM
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete
Crete, Greece
CoNEXT 2018
4.12.18 - 7.12.18
en
10.1145/3281411.3281434
1
TorstenZimmermann
BenediktWolters
OliverHohlfeld
KlausWehrle
inproceedings
2018-ziegeldorf-shield
SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments
2018
12
1-15
iop,mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-acsac-shield.pdf
ACM
New York, NY, USA
Proceedings of the 34rd Annual Computer Security Applications Conference
San Juan, Puerto Rico, USA
The 34rd Annual Computer Security Applications Conference (ACSAC 2018)
2018-12-03 - 2018-12-07
English
10.1145/3274694.3274716
1
Jan HenrikZiegeldorf
JanMetzke
KlausWehrle
inproceedings
2018-rueth-mining
Digging into Browser-based Crypto Mining
2018
10
31
maki,internet-measurements
http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf
https://arxiv.org/abs/1808.00811
ACM
Proceedings of the Internet Measurement Conference (IMC '18)
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278539
1
JanRüth
TorstenZimmermann
KonradWolsing
OliverHohlfeld
inproceedings
2018-tzimmermann-toplists
A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists
2018
10
31
maki
https://dl.acm.org/citation.cfm?id=3278574
https://arxiv.org/abs/1805.11506
ACM
Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278574
1
QuirinScheitle
OliverHohlfeld
JulienGamba
JonasJelten
TorstenZimmermann
Stephen D.Strowes
NarseoVallina-Rodriguez
inproceedings
2018-hohlfeld-santa
Application-Agnostic Offloading of Datagram Processing
2018
9
3
maki,ssiclops,reflexes
https://ieeexplore.ieee.org/document/8493053
IEEE
Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria
Vienna, Austria
International Teletraffic Congress ITC 30
03.09.2018 - 07-09.2018
en
10.1109/ITC30.2018.00015
1
OliverHohlfeld
Jens HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2018-matzutt-bitcoin-content-countermeasures
Thwarting Unwanted Blockchain Content Insertion
2018
4
17
364-370
Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous increase in adoption. By providing a persistent, distributed, and append-only ledger, blockchains enable numerous applications such as distributed consensus, robustness against equivocation, and smart contracts. However, recent studies show that blockchain systems such as Bitcoin can be (mis)used to store arbitrary content. This has already been used to store arguably objectionable content on Bitcoin's blockchain. Already single instances of clearly objectionable or even illegal content can put the whole system at risk by making its node operators culpable. To overcome this imminent risk, we survey and discuss the design space of countermeasures against the insertion of such objectionable content. Our analysis shows a wide spectrum of potential countermeasures, which are often combinable for increased efficiency. First, we investigate special-purpose content detectors as an ad hoc mitigation. As they turn out to be easily evadable, we also investigate content-agnostic countermeasures. We find that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain.
Bitcoin,blockchain,security,objectionable content,countermeasure
mynedata,iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-matzutt-blockchain-contents-countermeasures.pdf
https://ieeexplore.ieee.org/document/8360355
IEEE
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018)
Orlando, Florida, USA
First IEEE Workshop on Blockchain Technologies and Applications (BTA)
2018-04-17
English
978-1-5386-5008-0
10.1109/IC2E.2018.00070
1
RomanMatzutt
MartinHenze
Jan HenrikZiegeldorf
JensHiller
KlausWehrle
inproceedings
2018-tzimmermann-metacdn
Characterizing a Meta-CDN
2018
3
26
114-128
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf
https://arxiv.org/abs/1803.09990
Springer, Cham
In Proceedings of the Passive and Active Measurement Conference (PAM '18)
Berlin, Germany
Passive and Active Measurement Conference (PAM 2018)
26.3.2018 - 27.3.2018
en
978-3-319-76480-1
10.1007/978-3-319-76481-8_9
1
OliverHohlfeld
JanRüth
KonradWolsing
TorstenZimmermann
article
2016-fgcs-ziegeldorf-bitcoin
Secure and anonymous decentralized Bitcoin mixing
Future Generation Computer Systems
2018
3
80
448-466
Pseudonymity, anonymity, and untraceability
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf
Online
Elsevier
en
0167-739X
10.1016/j.future.2016.05.018
1
Jan HenrikZiegeldorf
RomanMatzutt
MartinHenze
FredGrossmann
KlausWehrle
inproceedings
2018-matzutt-bitcoin-content
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
2018
2
26
Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf
2018-01-07
Online
Springer
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Nieuwpoort, Curaçao
Financial Cryptography and Data Security 2018
en
10.1007/978-3-662-58387-6_23
1
RomanMatzutt
JensHiller
MartinHenze
Jan HenrikZiegeldorf
DirkMüllmann
OliverHohlfeld
KlausWehrle
inproceedings
2018-tzimmermann-split
SPLIT: Smart Protocol Loading for the IoT
2018
2
14
iop
https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf
https://dl.acm.org/citation.cfm?id=3234847.3234854
ACM
Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain
Madrid, Spain
European Conference on Wireless Sensor Networks (EWSN 2018)
14.2.2018 - 16.2.2018
en
978-0-9949886-2-1
1
TorstenZimmermann
JensHiller
Jens HelgeReelfs
PascalHein
KlausWehrle
incollection
2017-cps-henze-network
Network Security and Privacy for Cyber-Physical Systems
2017
11
13
25-56
sensorcloud,ipacs
Song, Houbing and Fink, Glenn A. and Jeschke, Sabina
Wiley-IEEE Press
First
2
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
en
978-1-119-22604-8
10.1002/9781119226079.ch2
1
MartinHenze
JensHiller
RenéHummen
RomanMatzutt
KlausWehrle
Jan HenrikZiegeldorf
inproceedings
2017-henze-mobiquitous-comparison
Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps
2017
11
7
543-544
trinics
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-comparison.pdf
Online
ACM
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous) - Poster Session, Melbourne, VIC, Australia
en
978-1-4503-5368-7
10.1145/3144457.3144511
1
MartinHenze
RitsumaInaba
Ina BereniceFink
Jan HenrikZiegeldorf
inproceedings
2017-henze-mobiquitous-cloudanalyzer
CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps
2017
11
7
262-271
Developers of smartphone apps increasingly rely on cloud services for ready-made functionalities, e.g., to track app usage, to store data, or to integrate social networks. At the same time, mobile apps have access to various private information, ranging from users' contact lists to their precise locations. As a result, app deployment models and data flows have become too complex and entangled for users to understand. We present CloudAnalyzer, a transparency technology that reveals the cloud usage of smartphone apps and hence provides users with the means to reclaim informational self-determination. We apply CloudAnalyzer to study the cloud exposure of 29 volunteers over the course of 19 days. In addition, we analyze the cloud usage of the 5000 most accessed mobile websites as well as 500 popular apps from five different countries. Our results reveal an excessive exposure to cloud services: 90 % of apps use cloud services and 36 % of apps used by volunteers solely communicate with cloud services. Given the information provided by CloudAnalyzer, users can critically review the cloud usage of their apps.
Privacy; Smartphones; Cloud Computing; Traffic Analysis
trinics
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-cloudanalyzer.pdf
Online
ACM
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia
Melbourne, VIC, Australia
November 7-10, 2017
en
978-1-4503-5368-7
10.1145/3144457.3144471
1
MartinHenze
JanPennekamp
DavidHellmanns
ErikMühmer
Jan HenrikZiegeldorf
ArthurDrichel
KlausWehrle
inproceedings
2017-liew-schemmel-fp
Floating-Point Symbolic Execution: A Case Study in N-Version Programming
2017
10
30
symbiosys
file:1848
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering
Urbana-Champaign, IL, USA
en
978-1-5386-2684-9/17
1
DanielLiew
DanielSchemmel
CristianCadar
AlastairDonaldson
RafaelZähl
KlausWehrle
inproceedings
2017-zimmermann-qoe
A QoE Perspective on HTTP/2 Server Push
2017
8
21
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-internetqoe-push.pdf
ACM
ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017), Los Angeles, USA
Los Angeles, USA
ACM SIGCOMM 2017 2nd Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2017)
21.8.2017 - 25.8.2017
en
978-1-4503-5056-3
10.1145/3098603.3098604
1
TorstenZimmermann
BenediktWolters
OliverHohlfeld
inproceedings
2017-henze-trustcom-dcam
Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things
2017
8
1
185-192
sscilops, ipacs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-trustcom-dcam.pdf
Online
IEEE
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia
en
978-1-5090-4905-9
2324-9013
10.1109/Trustcom/BigDataSE/ICESS.2017.236
1
MartinHenze
BenediktWolters
RomanMatzutt
TorstenZimmermann
KlausWehrle
article
2017-ziegeldorf-bmcmedgenomics-bloom
BLOOM: BLoom filter based Oblivious Outsourced Matchings
BMC Medical Genomics
2017
7
26
10
Suppl 2
29-42
Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-Bloom and PHE-Bloom, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-Bloom is fully secure in the semi-honest model while PHE-Bloom slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-Bloom is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (σ=8.73 s) with our first approach and a mere 0.07 s (σ=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-Bloom, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-Bloom, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude.
Proceedings of the 5th iDASH Privacy and Security Workshop 2016
Secure outsourcing; Homomorphic encryption; Bloom filters
sscilops; mynedata; rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-bmcmedgenomics-bloom.pdf
Online
BioMed Central
Chicago, IL, USA
November 11, 2016
en
1755-8794
10.1186/s12920-017-0277-y
1
Jan HenrikZiegeldorf
JanPennekamp
DavidHellmanns
FelixSchwinger
IkeKunze
MartinHenze
JensHiller
RomanMatzutt
KlausWehrle
inproceedings
2017-zimmermann-networking-http2
How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push
2017
6
12
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf
IEEE
Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden
Stockholm, Sweden
IFIP Networking 2017
12.-16.6.2017
978-3-901882-94-4
10.23919/IFIPNetworking.2017.8264830
1
TorstenZimmermann
JanRüth
BenediktWolters
OliverHohlfeld
inproceedings
2017-zimmermann-secon
Resource and Execution Control for Mobile Offloadee Devices
2017
6
12
maki
IEEE
14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA
San Diego, USA
14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017)
12.06.2017 - 14.06.2017
en
978-1-5090-6599-8
10.1109/SAHCN.2017.7964939
1
TorstenZimmermann
HannoWirtz
Jan HenrikZiegeldorf
ChristianSteinhaus
KlausWehrle
inproceedings
2017-henze-ic2e-prada
Practical Data Compliance for Cloud Storage
2017
4
4
252-258
ssiclops, ipacs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-ic2e-prada.pdf
Online
IEEE
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada
en
978-1-5090-5817-4
10.1109/IC2E.2017.32
1
MartinHenze
RomanMatzutt
JensHiller
ErikMühmer
Jan HenrikZiegeldorf
Johannesvan der Giet
KlausWehrle
inproceedings
2017-ziegeldorf-codaspy-priward
Privacy-Preserving HMM Forward Computation
2017
3
22
83-94
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf
Online
ACM
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA
en
978-1-4503-4523-1
10.1145/3029806.3029816
1
Jan HenrikZiegeldorf
JanMetzke
JanRüth
MartinHenze
KlausWehrle
inproceedings
2017-wirtz-zimmermann-percom-etc
Encrypting Data to Pervasive Contexts
2017
3
13
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-wirtz-zimmermann-percom-etc.pdf
Online
IEEE
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, HI, USA
en
978-1-5090-4328-6
10.1109/PERCOM.2017.7917877
1
HannoWirtz
TorstenZimmermann
MatteoCeriotti
KlausWehrle
inproceedings
2017-ziegeldorf-wons-tracemixer
TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party
2017
2
21
17-24
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-wons-tracemixer.pdf
Online
IEEE
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA
en
978-3-901882-88-3
10.1109/WONS.2017.7888771
1
Jan HenrikZiegeldorf
MartinHenze
JensBavendiek
KlausWehrle
incollection
2016-iiot-rueth-comm
Communication and Networking for the Industrial Internet of Things
2017
317-346
Online
Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B.
Springer
Industrial Internet of Things
en
978-3-319-42558-0
10.1007/978-3-319-42559-7_12
1
JanRüth
FlorianSchmidt
MartinSerror
KlausWehrle
TorstenZimmermann
inproceedings
2017-matzutt-mynedata
myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data
2017
1073-1084
Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.
Presentation slides are in German
Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling
mynedata_show
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf
https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf
Presentation slides
Eibl, Maximilian and Gaedke, Martin
Gesellschaft für Informatik, Bonn
INFORMATIK 2017
Chemnitz
INFORMATIK 2017
2017-09-28
English
978-3-88579-669-5
1617-5468
10.18420/in2017_109
1
RomanMatzutt
DirkMüllmann
Eva-MariaZeissig
ChristianeHorst
KaiKasugai
SeanLidynia
SimonWieninger
Jan HenrikZiegeldorf
GerhardGudergan
IndraSpiecker gen. Döhmann
KlausWehrle
MartinaZiefle
phdthesis
2017-ziegeldorf-phdthesis
Designing Digital Services with Cryptographic Guarantees for Data Security and Privacy
2017
RWTH Aachen University
Jan HenrikZiegeldorf
inproceedings
2016-henze-wpes-cppl
CPPL: Compact Privacy Policy Language
2016
10
24
99-110
ssiclops
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-wpes-cppl.pdf
Online
ACM
Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4569-9
10.1145/2994620.2994627
1
MartinHenze
JensHiller
SaschaSchmerling
Jan HenrikZiegeldorf
KlausWehrle
inproceedings
2016-matzutt-ccs-bitcoin
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
2016
10
24
1769-1771
mynedata
/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989059
1
RomanMatzutt
OliverHohlfeld
MartinHenze
RobinRawiel
Jan HenrikZiegeldorf
KlausWehrle
inproceedings
2016-werner-networking-stean
STEAN: A Storage and Transformation Engine for Advanced Networking Context
2016
5
17
maki
IEEE
Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira
Vienna, Austria
IFIP Networking 2016
17.-19.5.2016
978-3-9018-8283-8
10.1109/IFIPNetworking.2016.7497203
1
MarcWerner
JohannesSchwandtke
MatthiasHollick
OliverHohlfeld
TorstenZimmermann
KlausWehrle
inproceedings
2016-zimmermann-remp
ReMP TCP: Low Latency Multipath TCP
2016
5
IEEE
Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia
Kuala Lumpur, Malaysia
ICC 2016
23.-27.5.2016
978-1-4799-6664-6
1938-1883
10.1109/ICC.2016.7510787
1
AlexanderFrömmgen
TobiasErbshäuser
TorstenZimmermann
KlausWehrle
AlejandroBuchmann
inproceedings
2016-panchenko-ndss-fingerprinting
Website Fingerprinting at Internet Scale
2016
2
21
The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction. This attack can be performed by a local passive eavesdropper – one of the weakest adversaries in the attacker model of anonymization networks such as Tor. In this paper, we present a novel website fingerprinting attack. Based on a simple and comprehensible idea, our approach outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient. In order to evaluate the severity of the website fingerprinting attack in reality, we collected the most representative dataset that has ever been built, where we avoid simplified assumptions made in the related work regarding selection and type of webpages and the size of the universe. Using this data, we explore the practical limits of website fingerprinting at Internet scale. Although our novel approach is by orders of magnitude computationally more efficient and superior in terms of detection accuracy, for the first time we show that no existing method – including our own – scales when applied in realistic settings. With our analysis, we explore neglected aspects of the attack and investigate the realistic probability of success for different strategies a real-world adversary may follow.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-panchenko-ndss-fingerprinting.pdf
https://www.informatik.tu-cottbus.de/~andriy/zwiebelfreunde/
Internet Society
Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS '16), February 21-24, 2016, San Diego, CA, USA
San Diego, CA, USA
February 21-24, 2016
978-1-891562-41-9
10.14722/ndss.2016.23477
1
AndriyPanchenko
FabianLanze
AndreasZinnen
MartinHenze
JanPennekamp
KlausWehrle
ThomasEngel
inproceedings
2016-zimmermann-wons-mirco
Maintaining Integrity and Reputation in Content Offloading
2016
1
25-32
maki
http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-zimmermann-wons-mirco.pdf
IEEE
12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy
Cortina d'Ampezzo, Italy
12th International Conference on Wireless On-demand Network Systems and Services (WONS)
January 20 - 22 2016
en
978-3-901882-80-7
1
TorstenZimmermann
JanRüth
HannoWirtz
KlausWehrle
article
2016-sdnflex_si
Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management
Wiley Journal of Network Management
2016
26
1
http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf
OliverHohlfeld
ThomasZinner
TheophilusBenson
DavidHausheer
conference
2016-erwin
ERWIN - Enabling the Reproducible Investigation of Waiting Times for Arbitrary Workflows
2016
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7498938&tag=1
IEEE QoMEX
IEEE QoMEX
10.1109/QoMEX.2016.7498938
ThomasZinner
MatthiasHirth
ValentinFischer
OliverHohlfeld
inproceedings
2015-ziegeldorf-cans-boma
Bandwidth-optimized Secure Two-Party Computation of Minima
2015
12
8
9476
197-213
/fileadmin/papers/2015/2015-ziegeldorf-cans-boma.pdf
Online
Springer
Lecture Notes in Computer Science
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco
en
978-3-319-26822-4
10.1007/978-3-319-26823-1_14
1
Jan HenrikZiegeldorf
JensHiller
MartinHenze
HannoWirtz
KlausWehrle
inproceedings
2015-zimmermann-remp
Remp TCP: Low latency Multipath TCP
2015
12
1
ACM
Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany
Heidelberg, Germany
CoNEXT 2015
1.-4.12.2015
1
AlexanderFrömmgen
TobiasErbshäuser
TorstenZimmermann
KlausWehrle
AlejandroBuchmann
inproceedings
2015-wirtz-wifi-sharing
Collaborative On-demand Wi-Fi Sharing
2015
10
19-27
http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-lcn-cows.pdf
Online
IEEE
40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA
Clearwater Beach, Florida, USA
40th IEEE Conference on Local Computer Networks (LCN)
October 26-29 2015
en
10.1109/LCN.2015.7366279
1
HannoWirtz
TorstenZimmermann
MartinSerror
KlausWehrle
inproceedings
2015-ziegeldorf-dpm-comparison
Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper)
2015
9
22
9481
226-234
fileadmin/papers/2015/2015-ziegeldorf-dpm-cbp.pdf
Online
Springer
Lecture Notes in Computer Science
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria
en
978-3-319-29882-5
10.1007/978-3-319-29883-2_15
1
Jan HenrikZiegeldorf
MartinHenze
RenéHummen
KlausWehrle
inproceedings
2015-ahfe-kowalewski-facebook
Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany
Procedia Manufacturing
2015
7
3
815--822
Elsevier
The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA
en
2351-9789
10.1016/j.promfg.2015.07.336
1
SylviaKowalewski
MartinaZiefle
Jan HenrikZiegeldorf
KlausWehrle
inproceedings
2015-wirtz-secon
Enabling Ubiquitous Interaction with Smart Things
2015
6
24
256-264
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf
http://www.comsys.rwth-aachen.de/short/secon15-stif
Online
IEEE
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA
Seattle, USA
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015)
22.06.2015 - 25.06.2015
en
10.1109/SAHCN.2015.7338324
1
HannoWirtz
JanRüth
MartinSerror
TorstenZimmermann
KlausWehrle
inproceedings
2015-ziegeldorf-iwpe-comparison
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
2015
5
21
198-205
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf
Online
IEEE
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA
en
10.1109/SPW.2015.9
1
Jan HenrikZiegeldorf
JanMetzke
MartinHenze
KlausWehrle
proceedings
2015-sdnflex-heuschkel-dyns
Protocol Virtualization through Dynamic Network Stacks
2015
3
9
IEEE
Cottbus
SDNFlex Workshop (NetSys 2015)
March 2015, 9-12
en
10.1109/NetSys.2015.7089055
1
JensHeuschkel
ImmanuelSchweizer
TorstenZimmermann
KlausWehrle
MaxMühlhäuser
inproceedings
2014-ziegeldorf-codaspy-coinparty
CoinParty: Secure Multi-Party Mixing of Bitcoins
2015
3
2
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf
Online
ACM
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
San Antonio, TX, USA
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015)
en
978-1-4503-3191-3
10.1145/2699026.2699100
1
Jan HenrikZiegeldorf
FredGrossmann
MartinHenze
NicolasInden
KlausWehrle
proceedings
2014-kuvs-zimmermann-mindgap
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols
2014
9
29
Stuttgart
1st KuVS Workshop on Anticipatory Networks
September 29-30, 2014
1
MarcWerner
TobiasLange
MatthiasHollick
TorstenZimmermann
KlausWehrle
poster
2014-wisec-ziegeldorf-ipin
POSTER: Privacy-preserving Indoor Localization
2014
7
23
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-ziegeldorf-poster-wisec.pdf
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
en
10.13140/2.1.2847.4886
1
Jan HenrikZiegeldorf
NicolaiViol
MartinHenze
KlausWehrle
inproceedings
2014-wowmom-wirtz-cafi
CA-Fi: Ubiquitous Mobile Wireless Networking without 802.11 Overhead and Restrictions
2014
6
17
fileadmin/papers/2014/2014-wirtz-wowmom-cafi.pdf
online
IEEE
15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
en
10.1109/WoWMoM.2014.6918950
1
HannoWirtz
TorstenZimmermann
MatteoCeriotti
KlausWehrle
inproceedings
2014-smartcity-zimmermann-pubtrans
Analyzing Metropolitan-area Networking within Public Transportation Systems for Smart City Applications
2014
3
30
fileadmin/papers/2014/2014-zimmermann-smartcity-pubtrans.pdf
Online
IEEE
Proceedings of the 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14), Dubai, UAE
Dubai, UAE
1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14)
30 March - 2 April 2014
en
10.1109/NTMS.2014.6814007
1
TorstenZimmermann
HannoWirtz
OscarPuñal
KlausWehrle
inproceedings
2014-mmsys-wirtz-ubifi
A Wireless Application Overlay for Ubiquitous Mobile Multimedia Sensing and Interaction
2014
3
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-wirtz-mmsys-ubifi.pdf
Online
ACM
Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore
Singapore
5th ACM Multimedia Systems Conference
19-21 March 2014
en
978-1-4503-2705-3
10.1145/2557642.2578224
1
HannoWirtz
JanRüth
TorstenZimmermann
MatteoCeriotti
KlausWehrle
inproceedings
2013-icnp-hummen-tailoring
Tailoring End-to-End IP Security Protocols to the Internet of Things
2013
10
7
1-10
iotsec
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-tailoring.pdf
Online
IEEE
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany
Göttingen, Germany
21st IEEE International Conference on Network Protocols (ICNP 2013)
7-10 Oct. 2013
en
978-1-4799-1270-4
10.1109/ICNP.2013.6733571
1
RenéHummen
HannoWirtz
Jan HenrikZiegeldorf
JensHiller
KlausWehrle
inproceedings
2013-chants-wirtz-heaven
Interest-based Cloud-facilitated Opportunistic Networking
2013
9
30
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf
Online
ACM
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA
Miami, USA
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013)
30 September 2013
en
978-1-4503-2363-5
10.1145/2505494.2505504
1
HannoWirtz
JanRüth
TorstenZimmermann
KlausWehrle
inproceedings
2013-wintech-bosling-models
Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks
2013
9
30
65--72
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-bosling-wintech-fingerprint.pdf
Online
ACM
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA
Miami, USA
8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)
30 September 2013
en
10.1145/2505469.2505477
1
MarcelBosling
MatteoCeriotti
TorstenZimmermann
Jó AgilaBitsch Link
KlausWehrle
article
2013-scn-ziegeldorf-iot-privacy
Privacy in the Internet of Things: Threats and Challenges
Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World'
2013
6
10
http://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-ziegeldorf-scn-privacy-in-the-iot.pdf
Online
Wiley
en
10.1002/sec.795
1
Jan HenrikZiegeldorf
OscarGarcia-Morchon
KlausWehrle
conference
2013-wowmom-punal-RFRA
RFRA: Random Forests Rate Adaptation for Vehicular Networks
2013
6
4
IEEE
Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)
Madrid, Spain
WoWMoM
June, 2013
accepted
OscarPuñal
HanzhiZhang
JamesGross
inproceedings
2013-hummen-towards
Towards Viable Certificate-based Authentication for the Web of Things
2013
4
19
iotsec
fileadmin/papers/2013/2013-hummen-towards.pdf
ACM
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Budapest, Hungary
2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy
en
978-1-4503-2003-0
10.1145/2463183.2463193
1
RenéHummen
Jan HenrikZiegeldorf
HosseinShafagh
ShahidRaza
KlausWehrle
inproceedings
2013-wisec-garcia-securing
Securing the IP-based Internet of Things with HIP and DTLS
2013
4
119--124
ACM
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)
978-1-4503-1998-0
10.1145/2462096.2462117
1
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
PedroMoreno-Sanchez
FranciscoVidal-Meca
Jan HenrikZiegeldorf
inproceedings
2013-pitsac-vidalmeca-hip
HIP security architecture for the IP-based Internet of Things
2013
3
25
1331 - 1336
The IP-based Internet of Things refers to the
pervasive interactions of smart objects and people enabling
new applications by means of IP protocols. An application
scenario is a Smart City in which the city infrastructure,
cars, and people exchange information to enable new services.
IP protocols, such as IPv6, TCP and HTTP will be further
complemented by IPv6 over Low powerWireless Personal Area
Networks and Constrained Application Protocol currently in
development in IETF. Security and privacy are a must for
the IP-based IoTs in order to ensure its acceptance. However,
mobility, limited bandwidth, and resource-constrained devices
pose new challenges and require for a sound and efficient
security architecture. In particular, dynamic association of
mobile smart objects and the management of keys in large-scale
networks remain an open challenge. In this context, we propose
a flexible security architecture based on the Host Identity
Protocol and Multimedia Internet KEYing protocols allowing
for secure network association and key management. HIP -
based on asymmetric-key cryptography - ensures unambiguous
thing identification, mobility support, as well as a lightweight
and secure method for network association. In our solution,
HIP is extended with MIKEY capabilities to provide enhanced
key management using polynomials, which allow to generate
pairwise keys with any node based on its identity. This
combination of protocols and crypto-algorithms ensures both
strong security and very good performance as shown by our
implementation and presents clear advantages compared with
other alternatives.
Internet of Things; Security; Network Access; Key Management
Online
IEEE
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013
Barcelona, Spain
25.-28.03.2013
en
10.1109/WAINA.2013.158
1
FranciscoVidal Meca
Jan HenrikZiegeldorf
OscarGarcia-Morchon
Sandeep S.Kumar
Sye LoongKeoh
PedroMoreno-Sanchez
conference
EW2013_parruca_gross
On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
2013
8
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models.
ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf
http://www.vde-verlag.de/proceedings-en/563498043.html
vde-verlag
vde-verlag
http://www.vde-verlag.de/
Proceedings: European Wireless 2013
Guildford, UK
2013 - 19th European Wireless Conference
04/16/2012 - 04/18/2013
English
DonaldParruca
MariusGrysla
PetriMähönen
MarinaPetrova
HanZhou
FarshadNaghibi
JamesGross
inproceedings
2012-hummen-seams
SEAMS: A Signaling Layer for End-host-Assisted Middlebox Services
2012
6
25
525--532
fileadmin/papers/2012/2012-hummen-seams.pdf
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)
IEEE
Liverpool, United Kingdom
en
978-1-4673-2172-3
10.1109/TrustCom.2012.250
1
RenéHummen
Jan HenrikZiegeldorf
TobiasHeer
HannoWirtz
KlausWehrle
article
2011-03-Zimmermann
IP address assignment in wireless mesh networks
Wireless Communications and Mobile Computing
2011
3
11
3
321-337
Online
John Wiley & Sons Ltd.
Hoboken, NJ, USA
en
10.1002/wcm.982
1
AlexanderZimmermann
ArndHannemann
BenjaminSchleinzer
proceedings
2009-aktas-maple-ModeldrivenSupportforSourceCodeVariabilityinAutomotiveSoftwareEngineering-Workshop
Model-driven Support for Source Code Variability in Automotive Software Engineering
2009
8
44-51
Variability on source code level in automotive soft- ware engineering is handled by C/C++ preprocessing directives. It provides fine-grained definition of variation points, but brings highly complex structures into the source code. The software gets more difficult to understand, to maintain and to integrate changes. Current approaches for modeling and managing vari- ability on source code do not consider the specific requirements of the automotive domain. To close this gap, we propose a model- driven approach to support software engineers in handling source code variability and configuration of software variants. For this purpose, a variability model is developed that is linked with the source code. Using this approach, a software engineer can shift work steps to the variability model in order to model and manage variation points and implement their variants in the source code.
automotive software engineering; programming; model-driven engineering; variability modeling;
Online
CEUR
1st International Workshop on Model-driven Approaches in Software Product Line Engineering (MAPLE), San Francisco, CA, USA
1613-0073
1
CemMengi
ChristianFuß
RubenZimmermann
IsmetAktas