This file was created by the TYPO3 extension
bib
--- Timezone: UTC
Creation date: 2024-12-03
Creation time: 13-38-45
--- Number of references
143
inproceedings
2025_pennekamp_mapxchange
MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps
2025
4
secure industrial collaboration; homomorphic encryption; data sharing; exchange platform; milling; process planning
internet-of-production
ACM
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing (SAC '25), March 31-April 4, 2025, Sicily, Italy
Sicily, Italy
ACM/SIGAPP Symposium on Applied Computing
March 31-April 4, 2025
accepted
1
JanPennekamp
JosephLeisten
PaulWeiler
MarkusDahlmanns
MarcelFey
ChrstianBrecher
SandraGeisler
KlausWehrle
article
2024_querfurth_mcbert
mcBERT: Patient-Level Single-cell Transcriptomics Data Representation
bioRxiv
2024
11
7
health
10.1101/2024.11.04.621897
Benediktvon Querfurth
JohannesLohmöller
JanPennekamp
ToreBleckwehl
RafaelKramann
KlausWehrle
SikanderHayat
inproceedings
2024-buildsys-breyer-waterreview
A Critical Review of Household Water Datasets
2024
11
6
318-322
www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-breyer-waterreview.pdf
Online
ACM
Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou, China
en
979-8-4007-0706-3/24/11
10.1145/3671127.3698793
1
JustusBreyer
MaximilianPetri
Muhammad HamadAlizai
KlausWehrle
inproceedings
2024-buildsys-breyer-transferstudy
Investigating Domain Bias in NILM
2024
11
6
333-336
www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-breyer-transferstudy.pdf
Online
ACM
Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou, China
en
979-8-4007-0706-3/24/11
10.1145/3671127.3699532
1
JustusBreyer
SparshJauhari
RenéGlebke
Muhammad HamadAlizai
MarkusStroot
KlausWehrle
inproceedings
2024-saillard-exploring
Exploring Anomaly Detection for Marine Radar Systems
2024
9
Marine radar systems are a core technical instrument for collision avoidance in shipping and an indispensable decision-making aid for navigators on the ship’s bridge in limited visibility conditions at sea, in straits, and harbors. While electromagnetic attacks against radars can be carried out externally, primarily by military actors, research has recently shown that marine radar is also vulnerable to attacks from cyberspace. These can be carried out internally, less “loudly”, and with significantly less effort and know-how, thus posing a general threat to the shipping industry, the global maritime transport system, and world trade.
Based on cyberattacks discussed in the scientific community and a simulation environment for marine radar systems, we investigate in this work to which extent existing Intrusion Detection System (IDS) solutions can secure vessels’ radar systems, how effective their detection capability is, and where their limits lie. From this, we derive a research gap for radar-specific methods and present the first two approaches in that direction. Thus, we pave the way for necessary future developments of anomaly detection specific for marine navigation radars.
Marine Radar Systems, Maritime Cyber Security, Intrusion Detection Systems, Anomaly Detection, Navico BR24
Springer
Proceedings of the 10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems
(CyberICPS '24), co-located with the the 29th European Symposium on Research in Computer Security (ESORICS '24)
Bydgoszcz, Poland
10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2024)
September 16-20, 2024
accepted
English
1
AntoineSaillard
KonradWolsing
KlausWehrle
JanBauer
inproceedings
2024-wolsing-deployment
Deployment Challenges of Industrial Intrusion Detection Systems
2024
9
With the escalating threats posed by cyberattacks on Industrial Control Systems (ICSs), the development of customized Industrial Intrusion Detection Systems (IIDSs) received significant attention in research. While existing literature proposes effective IIDS solutions evaluated in controlled environments, their deployment in real-world industrial settings poses several challenges. This paper highlights two critical yet often overlooked aspects that significantly impact their practical deployment, i.e., the need for sufficient amounts of data to train the IIDS models and the challenges associated with finding suitable hyperparameters, especially for IIDSs training only on genuine ICS data. Through empirical experiments conducted on multiple state-of-the-art IIDSs and diverse datasets, we establish the criticality of these issues in deploying IIDSs. Our findings show the necessity of extensive malicious training data for supervised IIDSs, which can be impractical considering the complexity of recording and labeling attacks in actual industrial environments. Furthermore, while other IIDSs circumvent the previous issue by requiring only benign training data, these can suffer from the difficulty of setting appropriate hyperparameters, which likewise can diminish their performance. By shedding light on these challenges, we aim to enhance the understanding of the limitations and considerations necessary for deploying effective cybersecurity solutions in ICSs, which might be one reason why IIDSs see few deployments.
Industrial Intrusion Detection Systems, Cyber-Physical
Systems, Industrial Control Systems, Deployment
https://arxiv.org/pdf/2403.01809
Springer
Proceedings of the 10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems
(CyberICPS '24), co-located with the the 29th European Symposium on Research in Computer Security (ESORICS '24)
Bydgoszcz, Poland
10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2024)
September 16-20, 2024
accepted
English
1
KonradWolsing
EricWagner
FrederikBasels
PatrickWagner
KlausWehrle
inproceedings
2024-dahlmanns-cired
Reliable and Secure Control Center to Station Device Communication
2024
6
19
The increasing demands on the power grid require intelligent and flexible solutions that ensure the grid's stability. Many of these measures involve sophisticated communication between the control center and the stations that is not efficiently realizable using traditional protocols, e.g., IEC 60870-5-104. To this end, IEC 61850 introduces data models which allow flexible communication. Still, the specification leaves open how DSOs should interconnect their stations to realize resilient communication between the control center and station devices. However, DSOs require such communication to adapt modern solutions increasing the grid's capacity, e.g., adaptive protection systems.
In this paper, we present our envisioned network and communication concept for future DSO's ICT infrastructures that enables the control center to resiliently and flexibly communicate with station devices. For resilience, we suggest interconnecting each station with two distinct communication paths to the control center, use MPLS-TP and MPTCP for fast failovers when a single link fails, and mTLS to protect the communication possibilities against misuse. Additionally, in accordance with IEC 61850, we envision the control center to communicate with the station devices using MMS by using the station RTU as a proxy.
ven2us
Proceedings of the CIRED workshop on Increasing Distribution Network Hosting Capacity 2024, June 19-20, 2024, Vienna, Austria
Vienna
CIRED workshop on Increasing Distribution Network Hosting Capacity 2024
June 19-20, 2024
10.1049/icp.2024.2096
1
MarkusDahlmanns
Ina BereniceFink
GerritErichsen
GuosongLin
ThomasHammer
BurkhardBorkenhagen
SebastianSchneider
ChristofMaahsen
KlausWehrle
inproceedings
2024-kunze-spintrap
SpinTrap: Catching Speeding QUIC Flows
2024
5
7
legato
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-kunze-spintrap.pdf
IEEE/IFIP
Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24)
2024 IEEE/IFIP Network Operations and Management Symposium
10.1109/NOMS59830.2024.10575719
1
IkeKunze
ConstantinSander
LarsTissen
BenediktBode
KlausWehrle
incollection
2024_pennekamp_blockchain-industry
Blockchain Technology Accelerating Industry 4.0
2024
3
7
105
531-564
Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related processes. Here, blockchain technology emerges as a possible driver that satisfies demands even in settings with mutually distrustful stakeholders. We identify significant benefits achieved by blockchain technology for Industry 4.0 but also point out challenges and corresponding design options when applying blockchain technology in the industrial domain. Furthermore, we survey diverse industrial sectors to shed light on the current intersection between blockchain technology and industry, which provides the foundation for ongoing as well as upcoming research. As industrial blockchain applications are still in their infancy, we expect that new designs and concepts will develop gradually, creating both supporting tools and groundbreaking innovations.
internet-of-production
Springer
Advances in Information Security
17
Blockchains – A Handbook on Fundamentals, Platforms and Applications
978-3-031-32145-0
10.1007/978-3-031-32146-7_17
1
JanPennekamp
LennartBader
EricWagner
JensHiller
RomanMatzutt
KlausWehrle
article
2024_pennekamp_supply-chain-survey
An Interdisciplinary Survey on Information Flows in Supply Chains
ACM Computing Surveys
2024
2
1
56
2
Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.
information flows; data communication; supply chain management; data security; data sharing; systematic literature review
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf
ACM
0360-0300
10.1145/3606693
1
JanPennekamp
RomanMatzutt
ChristopherKlinkmüller
LennartBader
MartinSerror
EricWagner
SidraMalik
MariaSpiß
JessicaRahn
TanGürpinar
EduardVlad
Sander J. J.Leemans
Salil S.Kanhere
VolkerStich
KlausWehrle
article
2024_pennekamp_supply-chain-sensing
Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs
IEEE Access
2024
1
8
12
9350-9368
Supply chains increasingly develop toward complex networks, both technically in terms of devices and connectivity, and also anthropogenic with a growing number of actors. The lack of mutual trust in such networks results in challenges that are exacerbated by stringent requirements for shipping conditions or quality, and where actors may attempt to reduce costs or cover up incidents. In this paper, we develop and comprehensively study four scenarios that eventually lead to end-to-end-secured sensing in complex IoT-based supply chains with many mutually distrusting actors, while highlighting relevant pitfalls and challenges—details that are still missing in related work. Our designs ensure that sensed data is securely transmitted and stored, and can be verified by all parties. To prove practical feasibility, we evaluate the most elaborate design with regard to performance, cost, deployment, and also trust implications on the basis of prevalent (mis)use cases. Our work enables a notion of secure end-to-end sensing with minimal trust across the system stack, even for complex and opaque supply chain networks.
blockchain technology; reliability; security; trust management; trusted computing; trusted execution environments
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-secure-sensing.pdf
2169-3536
10.1109/ACCESS.2024.3350778
1
JanPennekamp
FritzAlder
LennartBader
GianlucaScopelliti
KlausWehrle
Jan TobiasMühlberg
inproceedings
2024-basels-demo
Demo: Maritime Radar Systems under Attack. Help is on the Way!
2024
For a long time, attacks on radar systems were limited to military targets. With increasing interconnection, cyber attacks have nowadays become a serious complementary threat also affecting civil radar systems for aviation traffic control or maritime navigation. Hence, operators need to be enabled to detect and respond to cyber attacks and must be supported by defense capabilities. However, security research in this domain is only just beginning and is hampered by a lack of adequate test and development environments. In this demo, we thus present a maritime Radar Cyber Security Lab (RCSL) as a holistic framework to identify vulnerabilities of navigation radars and to support the development of defensive solutions. RCSL offers an offensive tool for attacking navigation radars and a defensive module leveraging network-based anomaly detection. In our demonstration, we will showcase the radars’ vulnerabilities in a simulative environment and demonstrate the benefit of an application-specific Intrusion Detection System.
IEEE
Proceedings of the 2023 IEEE 48th Conference on Local Computer Networks (LCN)
Caen, Normandy, France
October 8-10, 2024
accepted
1
FrederikBasels
KonradWolsing
ElmarPadilla
JanBauer
inproceedings
2023_bader_reputation-systems
Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
2023
11
16
464-475
Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volatile supply chain networks introduce, (2) give an overview of the diverse landscape of privacy-preserving reputation systems and their properties, and (3) based on well-established concepts from supply chain information systems and cryptography, we further propose an initial concept that accounts for the aforementioned challenges by utilizing fully homomorphic encryption. For future work, we identify the need of evaluating whether novel systems address the supply chain-specific privacy and confidentiality needs.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Volume 593
SCM; confidentiality; anonymity; voter; votee; FHE
internet-of-production
https://jpennekamp.de/wp-content/papercite-data/pdf/bpt+23.pdf
Springer
Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '23), November 14-17, 2023, Melbourne, VIC, Australia
Melbourne, VIC, Australia
November 14-17, 2023
978-3-031-63988-3
1867-8211
10.1007/978-3-031-63989-0_24
1
LennartBader
JanPennekamp
EmildeonThevaraj
MariaSpiß
Salil S.Kanhere
KlausWehrle
article
2023_lamberts_metrics-sok
SoK: Evaluations in Industrial Intrusion Detection Research
Journal of Systems Research
2023
10
31
3
1
Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This huge momentum facilitates the exploration of diverse promising paths but likewise risks fragmenting the research landscape and burying promising progress. Consequently, it needs sound and comprehensible evaluations to mitigate this risk and catalyze efforts into sustainable scientific progress with real-world applicability. In this paper, we therefore systematically analyze the evaluation methodologies of this field to understand the current state of industrial intrusion detection research. Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences. While we observe an increased use of public datasets, publications still only evaluate 1.3 datasets on average, and frequently used benchmarking metrics are ambiguous. At the same time, the adoption of newly developed benchmarking metrics sees little advancement. Finally, our systematic analysis enables us to provide actionable recommendations for all actors involved and thus bring the entire research field forward.
internet-of-production, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-lamberts-metrics-sok.pdf
eScholarship Publishing
2770-5501
10.5070/SR33162445
1
OlavLamberts
KonradWolsing
EricWagner
JanPennekamp
JanBauer
KlausWehrle
MartinHenze
inproceedings
2023-sander-quic-ecn
ECN with QUIC: Challenges in the Wild
2023
10
legato
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-sander-quic-ecn.pdf
https://arxiv.org/abs/2309.14273
ACM
Proceedings of the Internet Measurement Conference (IMC '23)
Internet Measurement Conference 2023
979-8-4007-0382-9/23/10
10.1145/3618257.3624821
1
ConstantinSander
IkeKunze
LeoBlöcher
MikeKosek
KlausWehrle
inproceedings
2023-wagner-lcn-repel
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
2023
10
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wagner-repel.pdf
IEEE
48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US
Daytona Beach, Florida, US
IEEE Conference on Local Computer Networks (LCN)
Oktober 1-5, 2023
accepted
en
1
EricWagner
NilsRothaug
KonradWolsing
LennartBader
KlausWehrle
MartinHenze
inproceedings
2023-wolsing-xluuvlab
XLab-UUV – A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles
2023
10
Roughly two-thirds of our planet is covered with water, and so far, the oceans have predominantly been used at their surface for the global transport of our goods and commodities. Today, there is a rising trend toward subsea infrastructures such as pipelines, telecommunication cables, or wind farms which demands potent vehicles for underwater work. To this end, a new generation of vehicles, large and Extra-Large Unmanned Underwater Vehicles (XLUUVs), is currently being engineered that allow for long-range, remotely controlled, and semi-autonomous missions in the deep sea. However, although these vehicles are already heavily developed and demand state-of-the-art communi- cation technologies to realize their autonomy, no dedicated test and development environments exist for research, e.g., to assess the implications on cybersecurity. Therefore, in this paper, we present XLab-UUV, a virtual testbed for XLUUVs that allows researchers to identify novel challenges, possible bottlenecks, or vulnerabilities, as well as to develop effective technologies, protocols, and procedures.
Maritime Simulation Environment, XLUUV, Cyber Range, Autonomous Shipping, Operational Technology
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wolsing-xluuvlab.pdf
IEEE
1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS)
Daytona Beach, Florida, USA
1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS)
Oktober 1-5, 2023
accepted
en
10.1109/LCN58197.2023.10223405
1
KonradWolsing
AntoineSaillard
ElmarPadilla
JanBauer
inproceedings
2023-bader-metrics
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks
2023
9
28
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bader-metrics.pdf
Proceedings of the 9th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems
(CyberICPS '23), co-located with the the 28th European Symposium on Research in Computer Security (ESORICS '23)
The Hague, The Netherlands
9th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS '23)
September 28, 2023
accepted
10.1007/978-3-031-54204-6_2
1
LennartBader
EricWagner
MartinHenze
MartinSerror
inproceedings
2023_bodenbenner_fairsensor
FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization
2023
7
20
The long-term utility and reusability of measurement data from production processes depend on the appropriate contextualization of the measured values. These requirements further mandate that modifications to the context need to be recorded. To be (re-)used at all, the data must be easily findable in the first place, which requires arbitrary filtering and searching routines. Following the FAIR guiding principles, fostering findable, accessible, interoperable and reusable (FAIR) data, in this paper, the FAIR Sensor Ecosystem is proposed, which provides a contextualization middleware based on a unified data metamodel. All information and relations which might change over time are versioned and associated with temporal validity intervals to enable full reconstruction of a system's state at any point in time. A technical validation demonstrates the correctness of the FAIR Sensor Ecosystem, including its contextualization model and filtering techniques. State-of-the-art FAIRness assessment frameworks rate the proposed FAIR Sensor Ecosystem with an average FAIRness of 71%. The obtained rating can be considered remarkable, as deductions mainly result from the lack of fully appropriate FAIRness metrics and the absence of relevant community standards for the domain of the manufacturing industry.
FAIR Data; Cyber-Physical Systems; Data Management; Data Contextualization; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bodenbenner-fair-ecosystem.pdf
IEEE
Proceedings of the 21th IEEE International Conference on Industrial Informatics (INDIN '23), July 17-20, 2023, Lemgo, Germany
Lemgo, Germany
July 17-20, 2023
978-1-6654-9313-0
2378-363X
10.1109/INDIN51400.2023.10218149
1
MatthiasBodenbenner
JanPennekamp
BenjaminMontavon
KlausWehrle
Robert H.Schmitt
inproceedings
2023-schemmel-kdalloc-tool
KDAlloc: The KLEE Deterministic Allocator: Deterministic Memory Allocation during Symbolic Execution and Test Case Replay
2023
7
13
https://dl.acm.org/doi/pdf/10.1145/3597926.3604921
ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023)
10.1145/3597926.3604921
1
DanielSchemmel
JulianBüning
FrankBusse
MartinNowack
CristianCadar
article
Jakobs_2023_3
Preserving the Royalty-Free Standards Ecosystem
European Intellectual Property Review
2023
7
45
7
371-375
It has long been recognized in Europe and elsewhere that standards-development organizations (SDOs) may adopt policies that require their participants to license patents essential to the SDO’s standards (standards-essential patents or SEPs) to manufacturers of standardized products (“implementers”) on a royalty-free (RF) basis. This requirement contrasts with SDO policies that permit SEP holders to charge implementers monetary patent royalties, sometimes on terms that are specified as “fair, reasonable and nondiscriminatory” (FRAND). As demonstrated by two decades of intensive litigation around the world, FRAND royalties have given rise to intractable disputes regarding the manner in which such royalties should be calculated and adjudicated. In contrast, standards distributed on an RF basis are comparatively free from litigation and the attendant transaction costs. Accordingly, numerous SDOs around the world have adopted RF licensing policies and many widely adopted standards, including Bluetooth, USB, IPv6, HTTP, HTML and XML, are distributed on an RF basis. This note briefly discusses the commercial considerations surrounding RF standards, the relationship between RF standards and open source software (OSS) and the SDO policy mechanisms – including “universal reciprocity” -- that enable RF licensing to succeed in the marketplace.
0142-0461
10.2139/ssrn.4235647
1
JorgeContreras
RudiBekkers
BradBiddle
EnricoBonadio
Michael A.Carrier
BernardChao
CharlesDuan
RichardGilbert
JoachimHenkel
ErikHovenkamp
MartinHusovec
KaiJakobs
Dong-hyuKim
Mark A.Lemley
Brian J.Love
LukeMcDonagh
Fiona M.Scott Morton
JasonSchultz
TimothySimcoe
Jennifer M.Urban
Joy YXiang
incollection
2023_rueppel_crd-b2.ii
Model-Based Controlling Approaches for Manufacturing Processes
2023
2
8
221-246
The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).
Process control; Model-based control; Data aggregation; Model identification; Model optimization
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_7
1
Adrian KarlRüppel
MuzafferAy
BenediktBiernat
IkeKunze
MarkusLandwehr
SamuelMann
JanPennekamp
PascalRabe
Mark P.Sanders
DominikScheurenberg
SvenSchiller
TiandongXi
DirkAbel
ThomasBergs
ChristianBrecher
UweReisgen
Robert H.Schmitt
KlausWehrle
incollection
2023_klugewilkes_crd-b2.iv
Modular Control and Services to Operate Line-less Mobile Assembly Systems
2023
2
8
303-328
The increasing product variability and lack of skilled workers demand for autonomous, flexible production. Since assembly is considered a main cost driver and accounts for a major part of production time, research focuses on new technologies in assembly. The paradigm of Line-less Mobile Assembly Systems (LMAS) provides a solution for the future of assembly by mobilizing all resources. Thus, dynamic product routes through spatiotemporally configured assembly stations on a shop floor free of fixed obstacles are enabled. In this chapter, we present research focal points on different levels of LMAS, starting with the macroscopic level of formation planning, followed by the mesoscopic level of mobile robot control and multipurpose input devices and the microscopic level of services, such as interpreting autonomous decisions and in-network computing. We provide cross-level data and knowledge transfer through a novel ontology-based knowledge management. Overall, our work contributes to future safe and predictable human-robot collaboration in dynamic LMAS stations based on accurate online formation and motion planning of mobile robots, novel human-machine interfaces and networking technologies, as well as trustworthy AI-based decisions.
Lineless mobile assembly systems (LMAS); Formation planning; Online motion planning; In-network computing; Interpretable AI; Human-machine collaboration; Ontology-based knowledge management
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-klugewilkes-iop-b2.iv.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_13
1
AlineKluge-Wilkes
RalphBaier
DanielGossen
IkeKunze
AleksandraMüller
AmirShahidi
DominikWolfschläger
ChristianBrecher
BurkhardCorves
MathiasHüsing
VerenaNitsch
Robert H.Schmitt
KlausWehrle
incollection
2023_pennekamp_crd-a.i
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
2023
2
8
35-60
The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_2
1
JanPennekamp
AnastasiiaBelova
ThomasBergs
MatthiasBodenbenner
AndreasBührig-Polaczek
MarkusDahlmanns
IkeKunze
MoritzKröger
SandraGeisler
MartinHenze
DanielLütticke
BenjaminMontavon
PhilippNiemietz
LuciaOrtjohann
MaximilianRudack
Robert H.Schmitt
UweVroomen
KlausWehrle
MichaelZeng
inproceedings
2023-lorz-cired
Interconnected grid protection systems - reference grid for testing an adaptive protection scheme
2023
3286-3290
ven2us
27th International Conference on Electricity Distribution (CIRED 2023), Rome, Italy, June 12-15, 2023
Rome, Italy
International Conference & Exhibition on Electricity Distribution (CIRED)
June 12-15, 2023
10.1049/icp.2023.0864
1
TobiasLorz
JohannJaeger
AntigonaSelimaj
ImmanuelHacker
AndreasUlbig
Jan-PeterHeckel
ChristianBecker
MarkusDahlmanns
Ina BereniceFink
KlausWehrle
GerritErichsen
MichaelSchindler
RainerLuxenburger
GuosongLin
inproceedings
2022-serror-ccs-inside
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring
2022
11
7
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-serror-ccs-inside.pdf
ACM
online
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Los Angeles, CA, USA
November 8, 2022
10.1145/3548606.3563500
1
MartinSerror
LennartBader
MartinHenze
ArneSchwarze
KaiNürnberger
inproceedings
2022-rechenberg-cim
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
2022
10
Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf
https://zenodo.org/record/7148794
Zenodo
European Workshop on Maritime Systems Resilience and Security (MARESEC 2022)
Bremerhaven, Germany
10.5281/zenodo.7148794
1
Merlinvon Rechenberg
NinaRößler
MariSchmidt
KonradWolsing
FlorianMotz
MichaelBergmann
ElmarPadilla
JanBauer
proceedings
2022-wolsing-radarsec
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
2022
9
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-radar.pdf
IEEE
Edmonton, Canada
47th IEEE Conference on Local Computer Networks (LCN)
September 26-29, 2022
10.1109/LCN53696.2022.9843801
1
KonradWolsing
AntoineSaillard
JanBauer
EricWagner
Christianvan Sloun
Ina BereniceFink
MariSchmidt
KlausWehrle
MartinHenze
inproceedings
2022-schemmel-kdalloc
A Deterministic Memory Allocator for Dynamic Symbolic Execution
2022
6
safe
https://drops.dagstuhl.de/opus/volltexte/2022/16237/pdf/LIPIcs-ECOOP-2022-9.pdf
European Conference on Object-Oriented Programming (ECOOP 2022)
10.4230/LIPIcs.ECOOP.2022.9
1
DanielSchemmel
JulianBüning
FrankBusse
MartinNowack
CristianCadar
inproceedings
2022_dahlmanns_tlsiiot
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
2022
5
31
252-266
The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed to use TLS. To understand whether these changes indeed lead to secure Industrial Internet of Things deployments, i.e., using TLS-based protocols, which are configured according to security best practices, we perform an Internet-wide security assessment of ten industrial protocols covering the complete IPv4 address space.
Our results show that both, retrofitted existing protocols and newly developed secure alternatives, are barely noticeable in the wild. While we find that new protocols have a higher TLS adoption rate than traditional protocols (7.2 % vs. 0.4 %), the overall adoption of TLS is comparably low (6.5 % of hosts). Thus, most industrial deployments (934,736 hosts) are insecurely connected to the Internet. Furthermore, we identify that 42 % of hosts with TLS support (26,665 hosts) show security deficits, e.g., missing access control. Finally, we show that support in configuring systems securely, e.g., via configuration templates, is promising to strengthen security.
industrial communication; network security; security configuration
internet-of-production, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-dahlmanns-asiaccs.pdf
ACM
Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan
Nagasaki, Japan
ASIACCS '22
May 30-June 3, 2022
978-1-4503-9140-5/22/05
10.1145/3488932.3497762
1
MarkusDahlmanns
JohannesLohmöller
JanPennekamp
JörnBodenhausen
KlausWehrle
MartinHenze
inproceedings
WagnerBH2022
Take a Bite of the Reality Sandwich: Revisiting the
Security of Progressive Message Authentication Codes
2022
5
18
207-221
/fileadmin/papers/2022/2022-wagner-r2d2.pdf
ACM
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22)
San Antonio, Texas, USA
15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22)
978-1-4503-9216-7/22/05
10.1145/3507657.3528539
1
EricWagner
JanBauer
MartinHenze
inproceedings
2022_wagner_ccchain
Scalable and Privacy-Focused Company-Centric Supply Chain Management
2022
5
4
Blockchain technology promises to overcome trust and privacy concerns inherent to centralized information sharing. However, current decentralized supply chain management systems do either not meet privacy and scalability requirements or require a trustworthy consortium, which is challenging for increasingly dynamic supply chains with constantly changing participants. In this paper, we propose CCChain, a scalable and privacy-aware supply chain management system that stores all information locally to give companies complete sovereignty over who accesses their data. Still, tamper protection of all data through a permissionless blockchain enables on-demand tracking and tracing of products as well as reliable information sharing while affording the detection of data inconsistencies. Our evaluation confirms that CCChain offers superior scalability in comparison to alternatives while also enabling near real-time tracking and tracing for many, less complex products.
supply chain management; blockchain; permissionless; deployment; tracing and tracking; privacy
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wagner-ccchain.pdf
IEEE
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China
Shanghai, China
May 2-5, 2022
978-1-6654-9538-7/22
10.1109/ICBC54727.2022.9805503
1
EricWagner
RomanMatzutt
JanPennekamp
LennartBader
IrakliBajelidze
KlausWehrle
MartinHenze
article
2022_brauner_iop
A Computer Science Perspective on Digital Transformation in Production
ACM Transactions on Internet of Things
2022
5
1
3
2
The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.
Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf
ACM
2691-1914
10.1145/3502265
1
PhilippBrauner
ManuelaDalibor
MatthiasJarke
IkeKunze
IstvánKoren
GerhardLakemeyer
MartinLiebenberg
JudithMichael
JanPennekamp
ChristophQuix
BernhardRumpe
Wilvan der Aalst
KlausWehrle
AndreasWortmann
MartinaZiefle
article
2022-wolsing-aistracks
Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches
Journal of Marine Science and Engineering
2022
1
14
10
1
The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, speed, and course of the sending vessels. AIS can thus serve as a tool to avoid collisions and increase onboard situational awareness. In recent years, AIS has been utilized in more and more applications since it enables worldwide surveillance of virtually any larger vessel and has the potential to greatly support vessel traffic services and collision risk assessment. Anomalies in AIS tracks can indicate events that are relevant in terms of safety and also security. With a plethora of accessible AIS data nowadays, there is a growing need for the automatic detection of anomalous AIS data. In this paper, we survey 44 research articles on anomaly detection of maritime AIS tracks. We identify the tackled AIS anomaly types, assess their potential use cases, and closely examine the landscape of recent AIS anomaly research as well as their limitations.
automatic identification system; AIS; anomaly detection; maritime safety; maritime security; maritime surveillance
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-aistracks.pdf
https://www.mdpi.com/2077-1312/10/1/112
en
10.3390/jmse10010112
1
KonradWolsing
LinusRoepert
JanBauer
KlausWehrle
inproceedings
2022-lorenz-ven2us
Interconnected network protection systems - the basis for the reliable and safe operation of distribution grids with a high penetration of renewable energies and electric vehicle
2022
Power grids are increasingly faced with the introduction of decentralized, highly volatile power supplies from renewable energies and high loads occurring from e-mobility. However, today’s static grid protection cannot manage all upcoming conditions while providing a high level of dependability and security. It forms a bottleneck of a future decarbonizing grid development.
In our research project, we develop and verify an adaptive grid protection algorithm. It calculates situation dependent protection parameters for the event of power flow shifts and topology changes caused by volatile power supplies due to the increase of renewable generation and the rapid expansion of e-mobility. As a result the distribution grid can be operated with the optimally adapted protection parameters and functions for changing operating states. To safely adjust the values on protection hardware in the field, i.e., safe from hardware failures and cyberattacks, we research resilient and secure communication concepts for the adaptive and interconnected grid protection system. Finally, we validate our concept and system by demonstrations in the laboratory and field tests.
ven2us
Proceedings of the CIRED workshop on E-mobility and power distribution systems 2022, June 2-3, 2022, Porto, Portugal
Porto
CIRED workshop on E-mobility and power distribution systems 2022
June 2-3, 2022
10.1049/icp.2022.0768
1
MatthiasLorenz
Tobias MarkusPletzer
MalteSchuhmacher
TorstenSowa
MichaelDahms
SimonStock
DavoodBabazadeh
ChristianBecker
JohannJaeger
TobiasLorz
MarkusDahlmanns
Ina BereniceFink
KlausWehrle
AndreasUlbig
PhilippLinnartz
AntigonaSelimaj
ThomasOffergeld
inproceedings
2021_pennekamp_laser
Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use
2021
12
21
Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base.
Background. As part of our collaborative research of advancing the scope of industrial applications through cybersecurity and privacy, we identified a set of common challenges and pitfalls that surface in such applied interdisciplinary collaborations.
Aim. Our goal with this paper is to support researchers in the emerging field of cybersecurity in industrial settings by formalizing our experiences as reference for other research efforts, in industry and academia alike.
Method. Based on our experience, we derived a process cycle of performing such interdisciplinary research, from the initial idea to the eventual dissemination and paper writing. This presented methodology strives to successfully bootstrap further research and to encourage further work in this emerging area.
Results. Apart from our newly proposed process cycle, we report on our experiences and conduct a case study applying this methodology, raising awareness for challenges in cybersecurity research for industrial applications. We further detail the interplay between our process cycle and the data lifecycle in applied research data management. Finally, we augment our discussion with an industrial as well as an academic view on this research area and highlight that both areas still have to overcome significant challenges to sustainably and securely advance industrial applications.
Conclusions. With our proposed process cycle for interdisciplinary research in the intersection of cybersecurity and industrial application, we provide a foundation for further research. We look forward to promising research initiatives, projects, and directions that emerge based on our methodological work.
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-laser-collaboration.pdf
ACSA
Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), co-located with the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA
Austin, TX, USA
Learning from Authoritative Security Experiment Results (LASER '20)
December 8, 2020
978-1-891562-81-5
10.14722/laser-acsac.2020.23088
1
JanPennekamp
ErikBuchholz
MarkusDahlmanns
IkeKunze
StefanBraun
EricWagner
MatthiasBrockmann
KlausWehrle
MartinHenze
inproceedings
2021_kiesel_5g
Development of a Model to Evaluate the Potential of 5G Technology for Latency-Critical Applications in Production
2021
12
15
739-744
Latency-critical applications in production promise to be essential enablers for performance improvement in production. However, they require the right and often wireless communication system. 5G technology appears to be an effective way to achieve communication system for these applications. Its estimated economic benefit on production gross domestic product is immense ($740 billion Euro until 2030). However, 55% of production companies state that 5G technology deployment is currently not a subject matter for them and mainly state the lack of knowledge on benefits as a reason. Currently, it is missing an approach or model for a use case specific, data-based evaluation of 5G technology influence on the performance of production applications. Therefore, this paper presents a model to evaluate the potential of 5G technology for latency-critical applications in production. First, we derive requirements for the model to fulfill the decision-makers' needs. Second, we analyze existing evaluation approaches regarding their fulfillment of the derived requirements. Third, based on outlined research gaps, we develop a model fulfilling the requirements. Fourth, we give an outlook for further research needs.
5G technology; latency-critical applications; production; evaluation model
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kiesel-5g-model.pdf
IEEE
Proceedings of the 28th IEEE International Conference on Industrial Engineering and Engineering Management (IEEM '21), December 13-16, 2021, Singapore, Singapore
Singapore, Singapore
December 13-16, 2021
978-1-6654-3771-4
10.1109/IEEM50564.2021.9673074
1
RaphaelKiesel
FalkBoehm
JanPennekamp
Robert H.Schmitt
inproceedings
2021-hemminghaus-sigmar
SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital Signatures
2021
11
25
Distributed maritime bridge systems are customary standard equipment on today’s commercial shipping and cruising vessels. The exchange of nautical data, e.g., geographical positions, is usually implemented using multicast network communication without security measures, which poses serious risks to the authenticity and integrity of transmitted data. In this paper, we introduce digital SIGnatures for MARitime systems (SIGMAR), a low-cost solution to seamlessly retrofit authentication of nautical data based on asymmetric cryptography. Extending the existing IEC 61162-450 protocol makes it is possible to build a backward-compatible authentication mechanism that prevents common cyber attacks. The development was successfully accompanied by permanent investigations in a bridge simulation environment, including a maritime cyber attack generator. We demonstrate SIGMAR’s feasibility by introducing a proof-of-concept implementation on low-cost and low-resource hardware and present a performance analysis of our approach.
Maritime Cyber Security;Authentication;Integrity;IEC 61162-450;NMEA 0183
IEEE
In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)
Dubai, United Arab Emirates
International Symposium on Networks, Computers and Communications
31 Oct.-2 Nov. 2021
10.1109/ISNCC52172.2021.9615738
1
ChristianHemminghaus
JanBauer
KonradWolsing
inproceedings
2021-sander-shardingrevisited
Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?
2021
11
2
legato
/fileadmin/papers/2021/2021-sander-sharding-revisited.pdf
https://arxiv.org/abs/2110.14239
ACM
Proceedings of the Internet Measurement Conference (IMC '21)
Internet Measurement Conference 2021
02.11.21 - 04.11.21
978-1-4503-9129-0/21/11
10.1145/3487552.3487832
1
ConstantinSander
LeoBlöcher
KlausWehrle
JanRüth
inproceedings
2021-kunze-signal-detection
Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing
2021
6
10
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-signal-detection.pdf
IEEE
Proceedings of the 2021 IEEE 30th International Symposium
on Industrial Electronics (ISIE)
978-1-7281-9023-5
2163-5145
10.1109/ISIE45552.2021.9576221
1
IkeKunze
PhilippNiemietz
LiamTirpitz
RenéGlebke
DanielTrauth
ThomasBergs
KlausWehrle
inproceedings
2021_gleim_factstack
FactStack: Interoperable Data Management and Preservation for the Web and Industry 4.0
2021
5
31
P-312
371-395
Data exchange throughout the supply chain is essential for the agile and adaptive manufacturing processes of Industry 4.0. As companies employ numerous, frequently mutually incompatible data management and preservation approaches, interorganizational data sharing and reuse regularly requires human interaction and is thus associated with high overhead costs. An interoperable system, supporting the unified management, preservation and exchange of data across organizational boundaries is missing to date. We propose FactStack, a unified approach to data management and preservation based upon a novel combination of existing Web-standards and tightly integrated with the HTTP protocol itself. Based on the FactDAG model, FactStack guides and supports the full data lifecycle in a FAIR and interoperable manner, independent of individual software solutions and backward-compatible with existing resource oriented architectures. We describe our reference implementation of the approach and evaluate its performance, showcasing scalability even to high-throughput applications. We analyze the system's applicability to industry using a representative real-world use case in aircraft manufacturing based on principal requirements identified in prior work. We conclude that FactStack fulfills all requirements and provides a promising solution for the on-demand integration of persistence and provenance into existing resource-oriented architectures, facilitating data management and preservation for the agile and interorganizational manufacturing processes of Industry 4.0. Through its open source distribution, it is readily available for adoption by the community, paving the way for improved utility and usability of data management and preservation in digital manufacturing and supply chains.
Lecture Notes in Informatics (LNI), Volume P-312
Web Technologies; Data Management; Memento; Persistence; PID; Industry 4.0
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2021/2021-gleim-btw-iop-interoperability-realization.pdf
Gesellschaft für Informatik
Proceedings of the 19th Symposium for Database Systems for Business, Technology and Web (BTW '21), September 13-17, 2021, Dresden, Germany
Dresden, Germany
September 13-17, 2021
978-3-88579-705-0
1617-5468
10.18420/btw2021-20
1
LarsGleim
JanPennekamp
LiamTirpitz
SaschaWelten
FlorianBrillowski
StefanDecker
inproceedings
2021-kunze-coordinate-transformation
Investigating the Applicability of In-Network Computing to Industrial Scenarios
2021
5
11
334-340
in-network computing; latency; approximation
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf
IEEE
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21)
978-1-7281-6207-2
10.1109/ICPS49255.2021.9468247
1
IkeKunze
RenéGlebke
JanScheiper
MatthiasBodenbenner
Robert H.Schmitt
KlausWehrle
article
2021_buckhorst_lmas
Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production
Procedia CIRP
2021
5
3
99
448-453
Assembly systems must provide maximum flexibility qualified by organization and technology to offer cost-compliant performance features to differentiate themselves from competitors in buyers' markets. By mobilization of multipurpose resources and dynamic planning, Line-less Mobile Assembly Systems (LMASs) offer organizational reconfigurability. By proposing a holarchy to combine LMASs with the concept of an Internet of Production (IoP), we enable LMASs to source valuable information from cross-level production networks, physical resources, software nodes, and data stores that are interconnected in an IoP. The presented holarchy provides a concept of how to address future challenges, meet the requirements of shorter lead times, and unique lifecycle support. The paper suggests an application of decision making, distributed sensor services, recommender-based data reduction, and in-network computing while considering safety and human usability alike.
Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME '20), July 14-17, 2020, Gulf of Naples, Italy
Internet of Production; Line-less Mobile Assembly System; Industrial Assembly; Smart Factory
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-buckhorst-holarchy.pdf
Elsevier
Gulf of Naples, Italy
July 14-17, 2020
2212-8271
10.1016/j.procir.2021.03.064
1
Armin F.Buckhorst
BenjaminMontavon
DominikWolfschläger
MelanieBuchsbaum
AmirShahidi
HenningPetruck
IkeKunze
JanPennekamp
ChristianBrecher
MathiasHüsing
BurkhardCorves
VerenaNitsch
KlausWehrle
Robert H.Schmitt
article
2021_bader_privaccichain
Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability
Information Processing & Management
2021
5
1
58
3
The benefits of information sharing along supply chains are well known for improving productivity and reducing costs. However, with the shift towards more dynamic and flexible supply chains, privacy concerns severely challenge the required information retrieval. A lack of trust between the different involved stakeholders inhibits advanced, multi-hop information flows, as valuable information for tracking and tracing products and parts is either unavailable or only retained locally. Our extensive literature review of previous approaches shows that these needs for cross-company information retrieval are widely acknowledged, but related work currently only addresses them insufficiently. To overcome these concerns, we present PrivAccIChain, a secure, privacy-preserving architecture for improving the multi-hop information retrieval with stakeholder accountability along supply chains. To address use case-specific needs, we particularly introduce an adaptable configuration of transparency and data privacy within our design. Hence, we enable the benefits of information sharing as well as multi-hop tracking and tracing even in supply chains that include mutually distrusting stakeholders. We evaluate the performance of PrivAccIChain and demonstrate its real-world feasibility based on the information of a purchasable automobile, the e.GO Life. We further conduct an in-depth security analysis and propose tunable mitigations against common attacks. As such, we attest PrivAccIChain's practicability for information management even in complex supply chains with flexible and dynamic business relationships.
multi-hop collaboration; tracking and tracing; Internet of Production; e.GO; attribute-based encryption
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-bader-ipm-privaccichain.pdf
Elsevier
0306-4573
10.1016/j.ipm.2021.102529
1
LennartBader
JanPennekamp
RomanMatzutt
DavidHedderich
MarkusKowalski
VolkerLücken
KlausWehrle
inproceedings
2020_pennekamp_parameter_exchange
Privacy-Preserving Production Process Parameter Exchange
2020
12
10
510-525
Nowadays, collaborations between industrial companies always go hand in hand with trust issues, i.e., exchanging valuable production data entails the risk of improper use of potentially sensitive information. Therefore, companies hesitate to offer their production data, e.g., process parameters that would allow other companies to establish new production lines faster, against a quid pro quo. Nevertheless, the expected benefits of industrial collaboration, data exchanges, and the utilization of external knowledge are significant.
In this paper, we introduce our Bloom filter-based Parameter Exchange (BPE), which enables companies to exchange process parameters privacy-preservingly. We demonstrate the applicability of our platform based on two distinct real-world use cases: injection molding and machine tools. We show that BPE is both scalable and deployable for different needs to foster industrial collaborations. Thereby, we reward data-providing companies with payments while preserving their valuable data and reducing the risks of data leakage.
secure industrial collaboration; Bloom filter; oblivious transfer; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-parameter-exchange.pdf
ACM
Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA
Austin, TX, USA
December 7-11, 2020
978-1-4503-8858-0/20/12
10.1145/3427228.3427248
1
JanPennekamp
ErikBuchholz
YannikLockner
MarkusDahlmanns
TiandongXi
MarcelFey
ChristianBrecher
ChristianHopmann
KlausWehrle
inproceedings
2020-henze-ccs-cybersecurity
Poster: Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
2020
11
9
Mitigating cybersecurity threats in power distribution grids requires a testbed for cybersecurity, e.g., to evaluate the (physical) impact of cyberattacks, generate datasets, test and validate security approaches, as well as train technical personnel. In this paper, we present a blueprint for such a testbed that relies on network emulation and power flow computation to couple real network applications with a simulated power grid. We discuss the benefits of our approach alongside preliminary results and various use cases for cybersecurity research and training for power distribution grids.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-henze-ccs-cybersecurity.pdf
ACM
New York, NY, USA
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Virtual Event, USA
November 9-13, 2020
10.1145/3372297.3420016
1
MartinHenze
LennartBader
JulianFilter
OlavLamberts
SimonOfner
Dennisvan der Velde
inproceedings
2020_matzutt_anonboot
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
2020
10
7
531-542
Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrapping processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-colluding privacy peers. However, the typically small number of privacy peers enable single adversaries to mimic distributed services. We thus present AnonBoot, a Sybil-resistant medium to securely bootstrap distributed anonymity services via public blockchains. AnonBoot enforces that peers periodically create a small proof of work to refresh their eligibility for providing secure anonymity services. A pseudo-random, locally replicable bootstrapping process using on-chain entropy then prevents biasing the election of eligible peers. Our evaluation using Bitcoin as AnonBoot's underlying blockchain shows its feasibility to maintain a trustworthy repository of 1000 peers with only a small storage footprint while supporting arbitrarily large user bases on top of most blockchains.
anonymization; bootstrapping; public blockchain; Sybil attack; anonymity network; cryptocurrency tumbler; Bitcoin; Tor
impact_digital; digital_campus
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-matzutt-anonboot.pdf
ACM
Proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS '20), October 5-9, 2020, Taipei, Taiwan
Taipei, Taiwan
ASIACCS 2020
October 5-9, 2020
978-1-4503-6750-9/20/10
10.1145/3320269.3384729
1
RomanMatzutt
JanPennekamp
ErikBuchholz
KlausWehrle
article
2020_niemietz_stamping
Stamping Process Modelling in an Internet of Production
Procedia Manufacturing
2020
7
11
49
61-68
Sharing data between companies throughout the supply chain is expected to be beneficial for product quality as well as for the economical savings in the manufacturing industry. To utilize the available data in the vision of an Internet of Production (IoP) a precise condition monitoring of manufacturing and production processes that facilitates the quantification of influences throughout the supply chain is inevitable. In this paper, we consider stamping processes in the context of an Internet of Production and the preliminaries for analytical models that utilize the ever-increasing available data. Three research objectives to cope with the amount of data and for a methodology to monitor, analyze and evaluate the influence of available data onto stamping processes have been identified: (i) State detection based on cyclic sensor signals, (ii) mapping of in- and output parameter variations onto process states, and (iii) models for edge and in-network computing approaches. After discussing state-of-the-art approaches to monitor stamping processes and the introduction of the fineblanking process as an exemplary stamping process, a research roadmap for an IoP enabling modeling framework is presented.
Proceedings of the 8th International Conference on Through-Life Engineering Service (TESConf '19), October 27-29, 2019, Cleveland, OH, USA
Stamping Process; Industry 4.0; Fine-blanking; Internet of production; Condition monitoring; Data analytics
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-niemietz-stamping-modelling.pdf
Elsevier
Cleveland, OH, USA
October 27-29, 2019
2351-9789
10.1016/j.promfg.2020.06.012
1
PhilippNiemietz
JanPennekamp
IkeKunze
DanielTrauth
KlausWehrle
ThomasBergs
inproceedings
2020-schemmel-porse
Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
2020
7
symbiosys
https://arxiv.org/pdf/2005.06688.pdf
https://arxiv.org/abs/2005.06688
Computer Aided Verification (CAV 2020)
32nd International Conference on Computer Aided Verification
10.1007/978-3-030-53288-8_18
1
DanielSchemmel
JulianBüning
CésarRodríguez
DavidLaprell
KlausWehrle
inproceedings
2020_pennekamp_supply_chain_accountability
Private Multi-Hop Accountability for Supply Chains
2020
6
7
Today's supply chains are becoming increasingly flexible in nature. While adaptability is vastly increased, these more dynamic associations necessitate more extensive data sharing among different stakeholders while simultaneously overturning previously established levels of trust. Hence, manufacturers' demand to track goods and to investigate root causes of issues across their supply chains becomes more challenging to satisfy within these now untrusted environments. Complementarily, suppliers need to keep any data irrelevant to such routine checks secret to remain competitive. To bridge the needs of contractors and suppliers in increasingly flexible supply chains, we thus propose to establish a privacy-preserving and distributed multi-hop accountability log among the involved stakeholders based on Attribute-based Encryption and backed by a blockchain. Our large-scale feasibility study is motivated by a real-world manufacturing process, i.e., a fine blanking line, and reveals only modest costs for multi-hop tracing and tracking of goods.
supply chain; multi-hop tracking and tracing; blockchain; attribute-based encryption; Internet of Production
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-supply-chain-privacy.pdf
IEEE
Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops '20), 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS '20), June 7-11, 2020, Dublin, Ireland
Dublin, Ireland
June 7-11, 2020
978-1-7281-7440-2
2474-9133
10.1109/ICCWorkshops49005.2020.9145100
1
JanPennekamp
LennartBader
RomanMatzutt
PhilippNiemietz
DanielTrauth
MartinHenze
ThomasBergs
KlausWehrle
article
2020_gleim_factDAG
FactDAG: Formalizing Data Interoperability in an Internet of Production
IEEE Internet of Things Journal
2020
4
14
7
4
3243-3253
In the production industry, the volume, variety and velocity of data as well as the number of deployed protocols increase exponentially due to the influences of IoT advances. While hundreds of isolated solutions exist to utilize this data, e.g., optimizing processes or monitoring machine conditions, the lack of a unified data handling and exchange mechanism hinders the implementation of approaches to improve the quality of decisions and processes in such an interconnected environment.
The vision of an Internet of Production promises the establishment of a Worldwide Lab, where data from every process in the network can be utilized, even interorganizational and across domains. While numerous existing approaches consider interoperability from an interface and communication system perspective, fundamental questions of data and information interoperability remain insufficiently addressed.
In this paper, we identify ten key issues, derived from three distinctive real-world use cases, that hinder large-scale data interoperability for industrial processes. Based on these issues we derive a set of five key requirements for future (IoT) data layers, building upon the FAIR data principles. We propose to address them by creating FactDAG, a conceptual data layer model for maintaining a provenance-based, directed acyclic graph of facts, inspired by successful distributed version-control and collaboration systems. Eventually, such a standardization should greatly shape the future of interoperability in an interconnected production industry.
Data Management; Data Versioning; Interoperability; Industrial Internet of Things; Worldwide Lab
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-iotj-iop-interoperability.pdf
IEEE
2327-4662
10.1109/JIOT.2020.2966402
1
LarsGleim
JanPennekamp
MartinLiebenberg
MelanieBuchsbaum
PhilippNiemietz
SimonKnape
AlexanderEpple
SimonStorms
DanielTrauth
ThomasBergs
ChristianBrecher
StefanDecker
GerhardLakemeyer
KlausWehrle
article
2020_mann_welding_layers
Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers
Advanced Structured Materials
2020
4
1
125
101-118
A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production.
Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19)
Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy
Internet-of-Production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf
Springer
Ponta Delgada, Azores, Portugal
October 24-25, 2019
978-981-15-2956-6
1869-8433
10.1007/978-981-15-2957-3_8
1
SamuelMann
JanPennekamp
TobiasBrockhoff
AnahitaFarhang
MahsaPourbafrani
LukasOster
Merih SeranUysal
RahulSharma
UweReisgen
KlausWehrle
Wilvan der Aalst
inproceedings
2020-kosek-tcp-conformance
MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild
2020
3
30
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf
https://arxiv.org/abs/2002.05400
Springer
Proceedings of the Passive and Active Measurement Conference (PAM '20)
Eugene, Oregon, USA
Passive and Active Measurement Conference (PAM 2020)
30.03.2020 - 31.03.2020
en
https://doi.org/10.1007/978-3-030-44081-7_8
1
MikeKosek
LeoBlöcher
JanRüth
TorstenZimmermann
OliverHohlfeld
article
2020-wehrle-digitalshadows
Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus
Der Profilbereich "Information & Communication Technology"
2020
0179-079X
10.18154/RWTH-2021-02496
MatthiasJarke
Wilvan der Aalst
ChristianBrecher
MatthiasBrockmann
IstvánKoren
GerhardLakemeyer
BernhardRumpe
GüntherSchuh
KlausWehrle
MartinaZiefle
article
2019-unterberg-matclass
In-situ material classification in sheet-metal blanking using deep convolutional neural networks
Production Engineering
2019
11
13
13
6
743-749
internet-of-production
10.1007/s11740-019-00928-w
1
MartinUnterberg
PhillipNiemietz
DanielTrauth
KlausWehrle
ThomasBergs
inproceedings
2019_pennekamp_dataflows
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective
2019
11
11
27-38
The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in the area of manufacturing across institutional boundaries to realize benefits such as increased profit margins and product quality as well as reduced product development costs and time to market. This interconnection of CPS will lead to a plethora of new dataflows, especially between (partially) distrusting entities. In this paper, we identify and illustrate these envisioned inter-organizational dataflows and the participating entities alongside two real-world use cases from the production domain: a fine blanking line and a connected job shop. Our analysis allows us to identify distinct security and privacy demands and challenges for these new dataflows. As a foundation to address the resulting requirements, we provide a survey of promising technical building blocks to secure inter-organizational dataflows in an IoP and propose next steps for future research. Consequently, we move an important step forward to overcome security and privacy concerns as an obstacle for realizing the promised potentials in an Internet of Production.
Internet of Production; dataflows; Information Security
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-dataflows.pdf
ACM
Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom
London, United Kingdom
November 11-15, 2019
978-1-4503-6831-5/19/11
10.1145/3338499.3357357
1
JanPennekamp
MartinHenze
SimoSchmidt
PhilippNiemietz
MarcelFey
DanielTrauth
ThomasBergs
ChristianBrecher
KlausWehrle
inproceedings
2019_pennekamp_infrastructure
Towards an Infrastructure Enabling the Internet of Production
2019
5
8
31-37
New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.
Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf
IEEE
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW
Taipei, TW
May 6-9, 2019
978-1-5386-8500-6/19
10.1109/ICPHYS.2019.8780276
1
JanPennekamp
RenéGlebke
MartinHenze
TobiasMeisen
ChristophQuix
RihanHai
LarsGleim
PhilippNiemietz
MaximilianRudack
SimonKnape
AlexanderEpple
DanielTrauth
UweVroomen
ThomasBergs
ChristianBrecher
AndreasBührig-Polaczek
MatthiasJarke
KlausWehrle
inproceedings
2019-glebke-hicss-integrated
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
2019
1
8
7252-7261
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-integrated.pdf
Online
University of Hawai'i at Manoa / AIS
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA
en
978-0-9981331-2-6
10.24251/HICSS.2019.871
1
RenéGlebke
MartinHenze
KlausWehrle
PhilippNiemietz
DanielTrauth
PatrickMattfeld
ThomasBergs
article
2019_wehrle_dagstuhl_beginners
The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research
ACM SIGCOMM Computer Communication Review
2019
1
49
1
24-30
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
0146-4833
10.1145/3314212.3314217
VaibhavBajpai
AnnaBrunstrom
AnjaFeldmann
WolfgangKellerer
AikoPras
HenningSchulzrinne
GeorgiosSmaragdakis
MatthiasWählisch
KlausWehrle
inproceedings
2018-bader-ethereum-car-insurance
Smart Contract-based Car Insurance Policies
2018
12
9
mynedata, internet-of-production, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-bader-ethereum-car-insurance.pdf
https://ieeexplore.ieee.org/document/8644136
IEEE
2018 IEEE Globecom Workshops (GC Wkshps)
Abu Dhabi, United Arab Emirates
1st International Workshop on Blockchain in IoT, co-located with IEEE Globecom 2018
2018-12-09
10.1109/GLOCOMW.2018.8644136
1
LennartBader
Jens ChristophBürger
RomanMatzutt
KlausWehrle
inproceedings
2018-cav-schemmel-liveness
Symbolic Liveness Analysis of Real-World Software
2018
7
14
symbiosys
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-schemmel-symbolic-liveness-analysis-of-real-world-software.pdf
Computer Aided Verification (CAV 2018)
Oxford, Great Britain
30th International Conference on Computer Aided Verification
2018-07-14 to 2018-07-17
en
10.1007/978-3-319-96142-2_27
1
DanielSchemmel
JulianBüning
OscarSoria Dustmann
ThomasNoll
KlausWehrle
inproceedings
2018-hiller-ic2e-cpplintegration
Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud
2018
4
19
241-249
ssiclops,iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf
https://ieeexplore.ieee.org/document/8360335
IEEE
Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA
Orlando, Florida, USA
2018 IEEE International Conference on Cloud Engineering (IC2E 2018)
2018-04-19
978-1-5386-5008-0
10.1109/IC2E.2018.00050
1
JensHiller
MaelKimmerlin
MaxPlauth
SeppoHeikkila
StefanKlauck
VilleLindfors
FelixEberhardt
DariuszBursztynowski
Jesus LlorenteSantos
OliverHohlfeld
KlausWehrle
inproceedings
2017-rueth-iwmeasure
Large-Scale Scanning of TCP’s Initial Window
2017
11
1
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf
ACM
In Proceedings of the Internet Measurement Conference (IMC '17)
London, UK
Proceedings of the 2017 Internet Measurement Conference
01.11.2017 - 03.11.2017
en
10.1145/3131365.3131370
1
JanRüth
ChristianBormann
OliverHohlfeld
inproceedings
2017-stoffers-dsrt-memo-ident
Automated Memoization: Automatically Identifying Memoization Units in Simulation Parameter Studies
2017
10
18
33-42
Automatic Memoization; Accelerating Parameter Studies; Performance Prediction
memosim,symbiosys
http://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-stoffers-dsrt-memo-ident.pdf
Online
IEEE
Proceedings of the 21st IEEE/ACM International Symposium on
Distributed Simulation and Real Time Applications (DS-RT 2017), Rome, Italy
Rome, Italy
en
10.1109/DISTRA.2017.8167664
1
MirkoStoffers
RalfBettermann
KlausWehrle
conference
2017-fink-brainlab-gmds
BrainLab - Ein Framework für mobile neurologische Untersuchungen
2017
8
29
Best Abstract Award
https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml
06.09.19
German Medical Science GMS Publishing House (2017)
62. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS).
Oldenburg
GMDS 2017
17-21 September 2017
10.3205/17gmds137
1
Ina BereniceFink
BerndHankammer
ThomasStopinski
YannicTitgemeyer
RoannRamos
EkaterinaKutafina
Jó AgilaBitsch
Stephan MichaelJonas
proceedings
2017-SymPerfPoster
SymPerf: Predicting Network Function Performance
2017
8
21
spp,erc,symbiosys,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf
ACM
Los Angeles, USA
ACM SIGCOMM 2017 Poster
21.8.2017 - 25.8.2017
en
978-1-4503-5057-0/17/08
10.1145/3123878.3131977
1
FelixRath
JohannesKrude
JanRüth
DanielSchemmel
OliverHohlfeld
Jó AgilaBitsch Link
KlausWehrle
article
dombrowski-vdi
Funktechnologien für Industrie 4.0
VDE Positionspapier
2017
6
1
VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.
Stresemannallee 15, 60596 Frankfurt am Main, Germany
IsmetAktas
AlexanderBentkus
FlorianBonanati
ArminDekorsy
ChristianDombrowski
MichaelDoubrava
AliGolestani
FrankHofmann
MikeHeidrich
StefanHiensch
RüdigerKays
MichaelMeyer
AndreasMüller
Stephanten Brink
NedaPetreska
MilanPopovic
LutzRauchhaupt
AhmadSaad
HansSchotten
ChristophWöste
IngoWolff
conference
2017-burgdorf-sleepylab
SleepyLab: An extendable mobile sleeplab based on wearable sensors
2017
4
24
1
abstract+poster
/fileadmin/papers/2017/2017-burgdorf-sleepylab-ifh17.pdf
http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf
2017-05-09
Online
Informatics for Health 2017, Manchester UK
Manchester, UK
Informatics for Health 2017, Manchester UK
24-26 April 2017
en
1
AndreasBurgdorf
Jó AgilaBitsch Link
StephanJonas
conference
2017-fink-brainlab
BrainLab – towards mobile brain research
2017
4
24
2
/fileadmin/papers/2017/2017-fink-brainlab.pdf
http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf
2017-05-09
Online
Informatics for Health 2017, Manchester UK
Manchester, UK
Informatics for Health 2017, Manchester UK
24-26 April 2017
en
1
Ina BereniceFink
BerndHankammer
ThomasStopinsky
RoannRamos
EkaterinaKutafina
Jó AgilaBitsch Link
StephanJonas
phdthesis
bitsch-2017-enabling-dtn
Enabling disruption tolerant services
2017
3
20
14
146
Disruption Tolerant Networking; Neighbor Discovery; Routing
https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-5164-3
2017-03-20
Online, Print
Klaus Wehrle
Shaker
Aachen, Germany
Reports on Communications and Distributed Systems
RWTH Aachen University
Chair for Communication and Distributed Systems
Ph.D. Thesis
en
978-3-8440-5164-3
10.2370/9783844051643
1
1
Jó AgilaBitsch
proceedings
2017-serror-netsys-industrial
Demo: A Realistic Use-case for Wireless Industrial Automation and Control
2017
3
16
koi
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/Ansari_et_al_Wireless_Industrial_Automation_Demo_NetSys_2017.pdf
IEEE
Göttingen, Germany
International Conference on Networked Systems (NetSys 2017)
10.1109/NetSys.2017.7931496
1
JunaidAnsari
IsmetAktas
ChristianBrecher
ChristophPallasch
NicolaiHoffmann
MarkusObdenbusch
MartinSerror
KlausWehrle
JamesGross
inproceedings
2017-ziegeldorf-wons-tracemixer
TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party
2017
2
21
17-24
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-wons-tracemixer.pdf
Online
IEEE
Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson Hole, WY, USA
en
978-3-901882-88-3
10.1109/WONS.2017.7888771
1
Jan HenrikZiegeldorf
MartinHenze
JensBavendiek
KlausWehrle
book
Jakobs_2017_1
Digitalisation: Challenge and Opportunity for Standardisation. Proc. 22nd EURAS Annual Standardisation Conference
2017
12
Hiert gibt es keine Autoren, nur Herausgeber.
Kai Jakobs, Knut Blind
Mainz Publishers
EURAS contributions to standardisation research,
978-3-95886-172-5
KaiJakobs
KnutBlind
inproceedings
2016-ahmed-sensys-poster-incremental
Poster Abstract: Incremental Checkpointing for Interruptible Computations
2016
11
14
1--2
We propose incremental checkpointing techniques enabling transiently powered devices to retain computational state across multiple activation cycles. As opposed to the existing approaches, which checkpoint complete program state, the proposed techniques keep track of modified RAM locations to incrementally update the retained state in secondary memory, significantly reducing checkpointing overhead both in terms of time and energy.
/fileadmin/misc/2016/2016-ahmed-sensys-poster-incremental.pdf
http://dl.acm.org/citation.cfm?id=2996701
2016-11-20
http://sensys.acm.org/2016/
Online
ACM
Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016), Stanford, CA, USA
Stanford, CA, USA
Sensys '16
November 14-16, 2016
en
978-1-4503-4263-6/16/11
http://dx.doi.org/10.1145/2994551.2996701
1
SaadAhmed
HassanKhan
Junaid HaroonSiddiqui
Jó AgilaBitsch Link
Muhammad HamadAlizai
inproceedings
2016-ackermann-healthcom-eeg-emotion
EEG-based Automatic Emotion Recognition: Feature Extraction, Selection and Classification Methods
2016
9
14
159--164
Automatic emotion recognition is an interdisciplinary research field which deals with the algorithmic detection of human affect, e.g. anger or sadness, from a variety of sources, such as speech or facial gestures. Apart from the obvious usage for industry applications in human-robot interaction, acquiring the emotional state of a person automatically also is of great potential for the health domain, especially in psychology and psychiatry. Here, evaluation of human emotion is often done using oral feedback or questionnaires during doctor-patient sessions. However, this can be perceived as intrusive by the patient. Furthermore, the evaluation can only be done in a non-continuous manner, e.g. once a week during therapy sessions.
In contrast, using automatic emotion detection, the affect state of a person can be evaluated in a continuous non-intrusive manner, for example to detect early on-sets of depression. An additional benefit of automatic emotion recognition is the objectivity of such an approach, which is not influenced by the perception of the patient and the doctor. To reach the goal of objectivity, it is important, that the source of the emotion is not easily manipulable, e.g. as in the speech modality. To circumvent this caveat, novel approaches in emotion detection research the potential of using physiological measures, such as galvanic skin sensors or pulse meters.
In this paper we outline a way of detecting emotion from brain waves, i.e., EEG data. While EEG allows for a continuous, real-time automatic emotion recognition, it furthermore has the charm of measuring the affect close to the point of emergence: the brain. Using EEG data for emotion detection is nevertheless a challenging task: Which features, EEG channel locations and frequency bands are best suited for is an issue of ongoing research. In this paper we evaluate the use of state of the art feature extraction, feature selection and classification algorithms for EEG emotion classification using data from the de facto standard dataset, DEAP. Moreover, we present results that help choose methods to enhance classification performance while simultaneously reducing computational complexity.
/fileadmin/papers/2016/2016-ackermann-healthcom-emorec.pdf
http://ieeehealthcom2016.com/
Online
IEEE
2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
Munich, Germany
2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
September 14-17, 2016
en
978-1-5090-3370-6
1
PascalAckermann
ChristianKohlschein
Jó AgilaBitsch Link
KlausWehrle
SabinaJeschke
article
2015-cheng-piap-jmu
Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening
JMIR Mhealth Uhealth
2016
7
20
4
3
e88
piap
http://mhealth.jmir.org/2016/3/e88/
http://www.ncbi.nlm.nih.gov/pubmed/27439444
Online
en
2291-5222
10.2196/mhealth.5284
1
Paula Glenda FerrerCheng
Roann MunozRamos
Jó AgilaBitsch Link
Stephan MichaelJonas
TimIx
Portia Lynn QuetulioSee
KlausWehrle
inproceedings
2016-zimmermann-remp
ReMP TCP: Low Latency Multipath TCP
2016
5
IEEE
Proceedings of the IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia
Kuala Lumpur, Malaysia
ICC 2016
23.-27.5.2016
978-1-4799-6664-6
1938-1883
10.1109/ICC.2016.7510787
1
AlexanderFrömmgen
TobiasErbshäuser
TorstenZimmermann
KlausWehrle
AlejandroBuchmann
inproceedings
2016-ramos-inpact-lexicon
How Do I Say "Sad?" Building a Depression-Lexicon for Psychologist in a Pocket
2016
4
30
1--6
29% Acceptance rate
/fileadmin/misc/2016/2016-ramos-inpact-lexicon.pdf
http://inpact-psychologyconference.org/2016/conference-program/
Online
Clara Pracana and Michael Wang
World Institute for Advanced Research and Science
Lisbon, Portugal
Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)
Lisbon, Portugal
International Psychological Applications Conference and Trends (InPACT 2016)
April 30 -- May 2, 2016
en
978-989-99389-6-0
1
Roann MunozRamos
Paula Glenda FerrerCheng
Jó AgilaBitsch Link
Stephan MichaelJonas
inproceedings
2016-ramos-inpact-feeling-meh
Feeling Meh: Psychologist in a pocket app for depression screening
2016
4
30
1--4
29% Acceptance rate
/fileadmin/misc/2016/2016-ramos-inpact-feeling-meh.pdf
http://inpact-psychologyconference.org/2016/conference-program/
Online
Clara Pracana and Michael Wang
World Institute for Advanced Research and Science
Lisbon, Portugal
Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)
Lisbon, Portugal
International Psychological Applications Conference and Trends (InPACT 2016)
April 30 -- May 2, 2016
en
978-989-99389-6-0
1
Roann MunozRamos
Paula Glenda FerrerCheng
Jó AgilaBitsch Link
Stephan MichaelJonas
article
2015-Jakobs-PIK
YOLO oder die Kunst der Internet-Kommunikation
PIK – Praxis der Informationsverarbeitung und Kommunikation
2016
38
4
129-133
DE
1865-8342
HelenBolke-Hermanns
KaiJakobs
article
2016-sdnflex_si
Editorial: Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management
Wiley Journal of Network Management
2016
26
1
http://onlinelibrary.wiley.com/doi/10.1002/nem.1915/pdf
OliverHohlfeld
ThomasZinner
TheophilusBenson
DavidHausheer
inproceedings
2015-zimmermann-remp
Remp TCP: Low latency Multipath TCP
2015
12
1
ACM
Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany
Heidelberg, Germany
CoNEXT 2015
1.-4.12.2015
1
AlexanderFrömmgen
TobiasErbshäuser
TorstenZimmermann
KlausWehrle
AlejandroBuchmann
inproceedings
2015-gerdes-authorization
Autorisierungsmanagement für das Internet of Things
2015
9
iotsec
Online
D•A•CH Security 2015
Sankt Augustin, Germany
D•A•CH Security 2015
08.09. - 09.09.2015
accepted
de
1
StefanieGerdes
RenéHummen
OlafBergmann
inproceedings
2015-bitsch-phealth-piap
Psychologist in a Pocket: Towards Depression Screening on Mobile Phones
2015
6
2
211
153 --159
Depression is the most prevalent clinical disorder and one of the main causes of disability. This makes early detection of depressive symptoms critical in its prevention and management. This paper presents and discusses the development of Psychologist in a Pocket (PiaP), a mental mHealth application for Android which screens and monitors for these symptoms, and–given the explicit permission of the user–alerts a trusted contact such as the mental health professional or a close friend, if it detects symptoms.
All text inputted electronically–such as short message services, emails, social network posts–is analyzed based on keywords related to depression based on DSM-5 and ICD criteria as well as Beck's Cognitive Theory of Depression and the Self-Focus Model. Data evaluation and collection happen in the background, on- device, without requiring any user involvement. Currently, the application is in an early prototype phase entering initial clinical validation.
fileadmin/papers/2015/2015-bitsch-phealth-piap.pdf
Print
Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin
IOS Press
Amsterdam
Studies in Health Technology and Informatics
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
Västerås, Sweden
12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
June 2-4, 2015
en
978-1-61499-515-9
0926-9630
10.3233/978-1-61499-516-6-153
1
Jó AgilaBitsch Link
RoannRamos
TimIx
Paula GlendaFerrer Cheng
KlausWehrle
inproceedings
2015-bitsch-phealth-brain
Towards Brain Research in a Pocket:
Bringing EEG Research and Diagnostics out of the Lab
2015
6
2
211
185 -- 190
Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment.
We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach.
fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf
Print
Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin
IOS Press
Amsterdam
Studies in Health Technology and Informatics
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
Västerås, Sweden
12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
June 2-4, 2015
en
978-1-61499-515-9
0926-9630
10.3233/978-1-61499-516-6-185
1
Jó AgilaBitsch Link
RoannRamos
CassandraSeverijns
KlausWehrle
proceedings
2015-Jakobs-EURAS-Book
The Role of Standards in Transatlantic Trade and Regulation. Proc. 20th EURAS Annual Standardisation Conference. EURAS contributions to standardisation research, vol. 9.
2015
Online
Mainz Publishers
978-3-95886-035-3
1
KatrineBergh Skriver
KaiJakobs
JesperJerlang
conference
HohlfeldIMC
A QoE Perspective on Sizing Network Buffers
2014
11
ACM Internet Measurement Conference
accepted
OliverHohlfeld
EnricPujol
FlorinCiucu
AnjaFeldmann
PaulBarford
article
2014-cheng-acta-geodyn-geomater
Use of MEMS accelerometers/inclinometers as a geotechnical monitoring method for ground subsidence
Acta Geodynamica et Geomaterialia
2014
10
8
11
4
1--12
Accelerometer and inclinometer are inertial sensors capable of measuring corresponding magnitude of Earth gravitational field along the direction of each axis. By means of rotation matrices related to inertial navigation methods, the output values of a three-dimensional accelerometer or a two-dimensional inclinometer can be transformed and processed into the azimuth and dip angle of the monitored target. With the rapid growth in development and cost reduction of Micro Electro Mechanical Systems (MEMS) and Wireless Sensor Network (WSN) in recent years, the engineers are able to carry out real-time wireless geotechnical monitoring during construction. In this paper, we set up a one-day measurement implemented by a self- developed wireless MEMS monitoring system on the surface in the construction site of South Hongmei Road super high way tunnel in Shanghai, by making use of rotation matrices in specific ways, the raw data are processed to expressions of three-dimensional normal vectors that represent the change of the ground. After unifying the vectors in the same coordinate system, we conduct a brief ground settlement analysis by means of an evaluation of the dip angles in the cross section and the azimuths of the sensor nodes.
http://www.irsm.cas.cz/index_en.php?page=acta_detail_doi&id=96
Online
Institute of Rock Structure and Mechanics of the ASCR, v.v.i.
Prague, Czech Republic
Online
en
2336-4351
10.13168/AGG.2014.0015
1
ChengLi
TomásFernández-Steeger
Jó AgilaBitsch Link
MatthiasMay
RafigAzzam
inproceedings
2014-mass-wirtz-mafi
High-performance, Energy-efficient Mobile Wireless Networking in 802.11 Infrastructure Mode
2014
10
fileadmin/papers/2014/2014-wirtz-mass-mafi.pdf
Online
IEEE Computer Society
Proceedings of The 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014), Philadelphia, PA, USA
Philadelphia, USA
11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014)
27 - 30 October 2014
en
978-1-4799-6035-4
10.1109/MASS.2014.21
1
HannoWirtz
GeorgKunz
JohannesLaudenberg
RobertBackhaus
KlausWehrle
inproceedings
2014-aasnet-henze-scslib
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
2014
9
24
37
370-375
sensorcloud
/fileadmin/papers/2014/2014-henze-aasnet-scslib.pdf
Online
Elsevier
Procedia Computer Science
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada
Halifax, NS, Canada
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14)
en
10.1016/j.procs.2014.08.055
1
MartinHenze
SebastianBereda
RenéHummen
KlausWehrle
inproceedings
2014-chants-wirtz-disco
Opportunistic Interaction in the Challenged Internet of Things
2014
9
7
1-8
fileadmin/papers/2014/2014-wirtz-chants-challenged_iot.pdf
online
ACM
Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, USA
Maui, Hawaii, USA
Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014)
7 September 2014
en
978-1-4503-3071-8
10.1145/2645672.2645679
1
HannoWirtz
JanRüth
MartinSerror
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2014-stoffers-omnet-parallel-inet
Enabling Distributed Simulation of OMNeT++ INET Models
2014
9
3
http://arxiv.org/pdf/1409.0994
arXiv:1409.0994
Online
Cornell University
Ithaca, New York, United States
Proceedings of the 1st OMNeT++ Community Summit, Hamburg, Germany
Hamburg, Germany
en
MirkoStoffers
RalfBettermann
JamesGross
KlausWehrle
inproceedings
2014-bitsch-extremecom-demo
Demo: Opportunistic Mobile Brain Research
2014
8
14
1--2
The majority of research using brain imaging and EEG techniques is currently limited to clinical environments, restricting experiments to synthetic tasks in controlled conditions.
Lifting these limitations brought about by this artificial set-up would allow us to perform neuropsychological assessments and research in mobile settings or at locations easier accessible to patients, possibly even in remote, hard to access areas.
We developed a tablet based mobile framework to present auditory and visual stimuli, capture wireless commercial EEG and screen interaction data, and analyze the recorded data for immediate evaluation, as well as share the data over internet or local opportunistic links.
To demonstrate the feasibility of our approach, we successfully replicated the experimental set-up and evaluation pipeline of two existing EEG studies on event-related potentials.
This work therefore lays the foundation to further truly mobile brain research and health-care applications.
fileadmin/papers/2014/2014-bitsch-extremcom-mobile-eeg-demo.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 6th Extreme Conference on Communication
Galapagos Islands, Ecuador
6th Extreme Conference on Communication
August 11-15, 2014
en
978-1-4503-2929-3
1
Jó AgilaBitsch Link
RoannRamos
DavidOrlea
KlausWehrle
inproceedings
2014-bitsch-extremecom-liquid-democracy
WIP: Opportunistic Vote Delegation for e-Voting based on Liquid Democracy
2014
8
14
1--4
Work in Progress Paper
fileadmin/papers/2014/2014-bitsch-extremecom-liquid-democracy.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 6th Extreme Conference on Communication
Galapagos Islands, Ecuador
6th Extreme Conference on Communication
August 11-15, 2014
en
978-1-4503-2929-3
1
Jó AgilaBitsch Link
AngelTchorbadjiiski
KlausWehrle
inproceedings
2013-wintech-bosling-models
Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks
2013
9
30
65--72
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-bosling-wintech-fingerprint.pdf
Online
ACM
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA
Miami, USA
8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)
30 September 2013
en
10.1145/2505469.2505477
1
MarcelBosling
MatteoCeriotti
TorstenZimmermann
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2013-smith-extremecom-demo
Demo: Opportunistic Deployment Support for Wireless Sensor Networks
2013
8
24
1--2
won "coolest demo award"
fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 5th Extreme Conference on Communication
Thorsmork, Iceland
5th Extreme Conference on Communication
August 24-30, 2013
en
978-1-4503-2171-6
1
PaulSmith
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2013-bitsch-extremecom-oneway
A Global One-Way Control Channel for Opportunistic Networks
2013
8
24
1--6
fileadmin/papers/2013/2013-bitsch-extremecom-oneway.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 5th Extreme Conference on Communication
Thorsmork, Iceland
5th Extreme Conference on Communication
August 24-30, 2013
en
978-1-4503-2171-6
1
Jó AgilaBitsch Link
AlaaAlhamoud
KlausWehrle
article
2013-fernandez-ceriotti-bitsch-and-then-the-weekend-jsan
“And Then, the Weekend Started”: Story of a WSN Deployment on a Construction Site
Journal of Sensor and Actuator Networks
2013
3
11
2
1
156--171
Wireless Sensor Networks (WSNs) are versatile monitoring systems that can provide a large amount of real-time data in scenarios where wired infrastructures are inapplicable or expensive. This technology is expected to be handled by domain experts, who perceive a WSN as a (promised to be) easy to deploy black box. This work presents the deployment experience of a WSN, as conducted by domain experts, in a ground improvement area. Building upon off-the-shelf solutions, a fuel cell powered gateway and 21 sensor devices measuring acceleration, inclination, temperature and barometric pressure were installed to monitor ground subsidence. We report about how poor GSM service, malfunctioning hardware, unknown communication patterns and obscure proprietary software required in-field ad-hoc solutions. Through the lessons learned, we look forward to investigating how to make the deployment of these systems an easier task.
sensor network deployment; experiences; in-field debugging
http://www.mdpi.com/2224-2708/2/1/156
Online
en
2224-2708
10.3390/jsan2010156
1
TomásFernández-Steeger
MatteoCeriotti
Jó AgilaBitsch Link
MatthiasMay
KlausHentschel
KlausWehrle
inproceedings
2012-IPIN-Peter-Versatile-Maps
Versatile Geo-referenced Maps for Indoor Navigation of Pedestrians
2012
11
13
1--4
fileadmin/papers/2012/2012-bitsch-IPIN-vegemite.pdf
http://www.surveying.unsw.edu.au/ipin2012/proceedings/session.php?code=6C&name=SLAM
Online
Li, Binghao Li and Gallagher, Thomas
School of Surveying and Geospatial Engineering, University of New South Wales, Sydney, Australia
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia
Sydney, Australia
2012 International Conference on Indoor Positioning and Indoor Navigation
November 13--15, 2012
en
978-0-646-57851-4
1
MichaelPeter
DieterFritsch
BernhardtSchäfer
AlfredKleusberg
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2012-IPIN-Viol-HMM
Hidden Markov Model-based 3D Path-matching using Raytracing-generated Wi-Fi Models
2012
11
13
1--10
fileadmin/papers/2012/2012-11-viol-ipin.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6418873&tag=1
Online
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia
Sydney, Australia
2012 International Conference on Indoor Positioning and Indoor Navigation
November 13--15, 2012
en
978-1-4673-1955-3
10.1109/IPIN.2012.6418873
1
NicolaiViol
Jó AgilaBitsch Link
HannoWirtz
DirkRothe
KlausWehrle
inproceedings
2012-IPIN-Bitsch-FlowPath
Indoor Navigation on Wheels (and on Foot) using Smartphones
2012
11
13
10 S.
fileadmin/papers/2012/2012-bitsch-IPIN-navigation-on-wheels.pdf
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6418931
Print
Piscataway, NJ, USA
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 11-13 November 2012 Sydney, Australia
IEEE
Sydney, Australia
2012 International Conference on Indoor Positioning and Indoor Navigation
November 13--15, 2012
en
978-1-4673-1955-3
10.1109/IPIN.2012.6418931
1
Jó AgilaBitsch Link
FelixGerdsmeier
PaulSmith
KlausWehrle
article
2012-JLBS-Bitsch-FootPath
Accurate Map-based Indoor Navigation on the Mobile
Journal of Location Based Services
2012
7
11
7
1
23-43
We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones, we accurately localise a user on her route and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.
http://www.tandfonline.com/doi/abs/10.1080/17489725.2012.692620
Online
Taylor & Francis
Bristol, PA, USA
en
1748-9733
10.1080/17489725.2012.692620
1
Jó AgilaBitsch Link
PaulSmith
NicolaiViol
KlausWehrle
inproceedings
2012-lora-mobiopp-Gossipmule:ScanningandDisseminatingInformationBetweenStationsinCooperativeWLANs
Gossipmule: Scanning and Disseminating Information Between Stations in Cooperative WLANs (Poster)
2012
3
15
87-88
In Cooperative WLAN scenarios, the lack of a centralized management, the existence of many administrative domains and the current association process in wireless networks make it difficult to guarantee the quality that users expect from services and networks.
We present Gossipmule, an agent for wireless nodes that enhances the QoE perceived by users in Cooperative WLANs. Gossipmule uses mobile Crowdsensing between the wireless nodes to collect and disseminate information regarding the network. This information is used by the agent to have a more assertive association when making decisions regarding the user-AP association.
(Poster)
/fileadmin/papers/2012/2012-lora-MobiOpp12-Gossipmule.pdf
http://dl.acm.org/citation.cfm?id=2159576&CFID=88550183&CFTOKEN=31687193
Online
ACM
New York, NY, USA
Proceedings of the Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2012, Zurich, Switzerland
Zurich, Switzerland
Proceedings of the Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2012
2012-03-15
en
978-1-4503-1208-0
10.1145/2159576.2159598
1
Mónica AlejandraLora Girón
AlexanderPaulus
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2012-extremecom-goliath-adama
A Versatile Architecture for DTN Services (Demo)
2012
3
10
1--2
In this demo we present our architecture for delivering ap-
plication services via Disruption or Delay Tolerant Networks
(DTNs). The search for a killer application is still ongoing.
Our architecture enables the community to quickly proto-
type new services and test them in the real world, outside
of simulators. Common tasks such as data transportation
through the network is handled by the framework but can
still be in
uenced by the service, if required. A robust plu-
gin architecture allows to deploy new applications and rout-
ing schemes without aecting stable-running services on the
same network, even if the source of the new plugin is un-
trusted.
Demo Abstract
http://extremecom2012.ee.ethz.ch/papers/7-extremecom2012-Goliath.pdf
Online
Hui, Pan and Lindgren, Anders
ETH Zurich
Zurich, Switzerland
Proceedings of the 4th Extreme Conference on Communication
Zurich Switzerland
4th Extreme Conference on Communication
March 10-14, 2012
en
1
AndréGoliath
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2012-wons-bosling-redmann-weingaertner
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
2012
1
9
131-134
https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-students-6lowpan-wons2012.pdf
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6138950#
Online
IEEE
Piscataway, NJ, USA
Proceedings of the 9th International Conference on
Wireless On-demand Network Systems and Services (WONS '12), Courmayeur, Italy
Courmayeur, Italy
en
978-1-4577-1722-2
10.1109/WONS.2012.6152218
1
MarcelBosling
TorstenRedmann
JeanTekam
EliasWeingaertner
KlausWehrle
inproceedings
2011-globecom-bitsch-geodtn
geoDTN: Geographic Routing in Disruption Tolerant Networks
2011
12
5
1 -- 5
In this paper we present a disruption tolerant routing algorithm based on geographic location information, which improves upon the hop count compared to the current state of the art by up to a factor of three in large scale human networks. Leveraging only the history of geographic movement patterns in the two-hop neighborhood, our algorithm is able to perform well in the absence of knowledge of social interaction between nodes and without detailed future schedule information.
Representing previously visited locations as probability distributions encoded in an efficient vector, we formalize a heuristic for efficiently forwarding messages in disruption tolerant networks, implement a framework for comparing our approach with the state of the art, and evaluate key metrics, such as hop count and delivery rate, as well as energy consumption and battery depletion fairness on real world data. We are able to outperform the state of the art in human mobility based networks considerably in terms of energy usage per node, thereby extending data network availability further into areas devoid of otherwise necessary communication infrastructure.
fileadmin/papers/2011/2011-GlobeCom-bitsch-geoDTN.pdf
Online
Piscataway, NJ, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Houston, Texas, USA
IEEE
Houston, Texas, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN)
5-9 December 2011
en
978-1-4244-9268-8
1930-529X
1
Jó AgilaBitsch Link
DanielSchmitz
KlausWehrle
inproceedings
2011-extremecom-bitsch-neighbordiscovery
Perfect Difference Sets for Neighbor Discovery
2011
9
26
1--6
We present an energy efficient neighbor discovery framework that enables Linux and TinyOS based systems to discover and connect to neighbors via IEEE 802.11 and IEEE 802.15.4, which are only available sporadically. Using quorum schemes, we schedule on and off times of the wireless transmitters, to guarantee mutual discovery with minimum power given a specific latency requirement. Neighbor discovery is fundamental to intermittently connected networks, such as disruption and delay tolerant networks and optimizing it, can lead to significant overall energy savings.
Using perfect difference sets, our results indicate that we reduce the latency by up to 10 times at a duty cycle of 2% compared to the state of the art. We further define and characterize our neighbor discovery scheme with respect to fairness for asymmetric energy scenarios. Using these results, we allow energy-harvesting applications to adjust neighbor discovery based on their current energy requirements as a well defined trade-off.
Neighbor Discovery; Sporadic Connectivity; Wireless Networks
fileadmin/papers/2011/2011-ExtremeCom-bitsch-NeighborDiscovery.pdf
http://www.cl.cam.ac.uk/~fb375/extremecom/2011/program.html
http://dl.acm.org/citation.cfm?id=2414398&CFID=194814085&CFTOKEN=73001357
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 3rd Extreme Conference of Communication (ExtremeCom 2011), Manaus, Brazil
Manaus, Brazil
ExtremeCom 2011
26-30 September 2011
en
978-1-4503-1079-6
1
Jó AgilaBitsch Link
ChristophWollgarten
StefanSchupp
KlausWehrle
inproceedings
2011-wirtz-chants
Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode
2011
9
23
fileadmin/papers/2011/2011-wirtz-chants.pdf
Online
ACM
New York, NY, USA
Proceedings of the ACM MobiCom Workshop on Challenged Networks (Chants 2011), Las Vegas, NV, USA
Las Vegas, NV, USA
ACM MobiCom Workshop on Challenged Networks (Chants 2011)
2011-09-23
en
978-1-4503-0870-0
10.1145/2030652.2030666
1
HannoWirtz
TobiasHeer
RobertBackhaus
KlausWehrle
inproceedings
2011-ipin-bitsch-footpath-long
FootPath: Accurate Map-based Indoor Navigation Using Smartphones
2011
9
21
1--8
We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.
footpath
fileadmin/papers/2011/2011-IPIN-bitsch-footpath-long.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6071934&tag=1
Online
IEEE
Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal
Guimarães, Portugal
2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)
21-23 September 2011
en
978-1-4577-1803-8
http://dx.doi.org/10.1109/IPIN.2011.6071934
1
Jó AgilaBitsch Link
PaulSmith
NicolaiViol
KlausWehrle
inproceedings
2011-ipin-bitsch-footpath
FootPath: Accurate Map-based Indoor Navigation Using Smartphones (short paper)
2011
9
21
1--4
We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the de- tected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.
short paper (long paper is also available)
footpath
fileadmin/papers/2011/2011-IPIN-bitsch-footpath.pdf
http://ipin2011.dsi.uminho.pt/PDFs/Shortpaper/17_Short_Paper.pdf
fileadmin/papers/2011/2011-IPIN-bitsch-footpath-slides.pdf
Online
IEEE
Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal
Guimarães, Portugal
2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)
21-23 September 2011
en
978-972-8692-63-6
1
Jó AgilaBitsch Link
PaulSmith
KlausWehrle
inproceedings
2011-wintech-wirtz
Demo: Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode
2011
9
19
89-90
Mobile Ad-Hoc Networks (MANETs) rely on the 802.11 ad- hoc mode to establish communication with nearby peers. In practice, this makes MANETs hard to realize. While 802.11-compliant mobile devices implement the ad-hoc mode on the hardware layer, the software layer typically does not implement support for ad-hoc networking in terms of ad-hoc routing and name resolution protocols. Modern mobile operating systems, such as Android and iOS, even hide the inherent ad-hoc functionality of the wireless card through restrictions in the OS. In contrast to this, support for the 802.11 infrastructure mode is a commodity.
We propose establishing ad-hoc networks using the 802.11 infrastructure mode. In MA-Fi (Mobile Ad-Hoc Wi-Fi), a small core of mobile router nodes (RONs) provides infrastruc-ture mode network access to mobile station nodes (STANs). As RONs also act as a station in infrastructure networks of other RONs, MA-Fi achieves multi-hop communication between RON and STAN devices in the overall network.
We show the creation and operation of mobile ad-hoc networks using MA-Fi. We focus on mobility of RONs and STANs as well as topology control in the overall network.
fileadmin/papers/2011/2011-wirtz-wintech.pdf
Online
ACM
New York, NY, USA
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA
Las Vegas, Nevada, USA
The Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization
2011-09-19
en
978-1-4503-0867-0
10.1145/2030718.2030737
1
HannoWirtz
RobertBackhaus
RenéHummen
KlausWehrle
inproceedings
VaegsABW2011
Efficient Power Management Using Out-of-Band Signaling
2011
9
16
77-80
A tremendous amount of energy is wasted today, because computing devices are left running all the time even though they are needed only sporadically. Especially in office environments many devices (e.g., printers) are very rarely turned off, because they need to be available from time to time and because it is inconvenient having to switch them on and off manually. Existing solutions, such as Wake-on-LAN (WoL), provide support for managing the power consumption of the network devices remotely using an always-on data channel. However, these solutions are inefficient, because power to the network interface has to be maintained even when the host system is asleep just to ensure remote accessibility.
We propose a Wireless Sensor Network (WSN) based out-of-band signaling architecture for network interfaces which minimizes the systems’ power consumption during the large idle periods when nobody is using them. This is done by separating the data and control channels on the Internet-enabled devices using a low-power out-of-band signaling channel based on battery driven, energy scavenging devices. Unlike existing solutions, which only allow parts of the system to go in sleep modes, our architecture allows the whole system, including the main power supply, to be shut down.
Our initial investigation indicates a significant reduction in energy consumption of devices during idle times compared to the existing in-band signaling mechanisms such as WoL.
Energy Saving, Wireless Sensor Network, Out-of-Band Signalling
https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-vaegs-fgsn-ecocom.pdf
Online
Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN), Paderborn, Germany
RWTH Aachen University
Paderborn, Germany
10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11)
September 15-16, 2011
en
1
TobiasVaegs
Muhammad HamadAlizai
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2011-ipsn-alizai-pad
Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks
2011
4
fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf
Online
ACM
New York, NY, USA
Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA
Chicago, IL, USA
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
StefanGötz
Jó AgilaBitsch Link
KlausWehrle
poster
2011-03-vomLehn-NSDI-PrivacyOnWeb
Work in Progress: Uncovering the Privacy Implications of Web Usage [Poster]
2011
3
poster and abstract
fileadmin/papers/2011/2011-03-vomLehn-NSDI-PrivacyOnWeb.pdf
Online
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA
Usenix
Boston, MA, USA
NSDI
March 30 – April 1, 2011
accepted
en
1
Hendrikvom Lehn
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2010-sensys-alizai-tinywifi
Poster Abstract: TinyOS Meets Wireless Mesh Networks
2010
11
429-430
We present TinyWifi, a nesC code base extending TinyOS to support Linux powered network nodes. It enables developers to build arbitrary TinyOS applications and protocols and execute them directly on Linux by compiling for the new TinyWifi platform. Using TinyWifi as a TinyOS platform, we expand the applicability and means of evaluation of wireless protocols originally designed for sensornets towards inherently similar Linux driven ad hoc and mesh networks.
Received Best Poster Award
fileadmin/papers/2010/2010-11-alizai-tinywifi-sensys.pdf
http://portal.acm.org/citation.cfm?id=1870058&preflayout=flat
Print
ACM
New York, NY, USA
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland
en
978-1-4503-0344-6
10.1145/1869983.1870058
1
Muhammad HamadAlizai
BernhardKirchen
Jó AgilaBitsch Link
HannoWirtz
KlausWehrle
inproceedings
201004IPSNbitschratmote
Demo Abstract: RatMote - A Sensor Platform for Animal Habitat Monitoring
2010
4
12
432--433
In this work, we present RatMote, a new wireless sensor node for subterranean animal habitat monitoring. RatMote has been developed for project RatPack, which aims at creating a new method for behavioral research on rats in their natural environment using wireless sensor nodes. Recent development in microcontroller architecture allowed us to design a sensor node which calculates up to 22 times more operations per mAh than the widely used TelosB node. This significant performance and efficiency increase allows us to perform computationally demanding algorithms inside the node, needed for vocalization analysis, localization, and mapping.
Demo Abstract
RatPack
fileadmin/papers/2010/2010-04-IPSN-bitsch-ratmote.pdf
http://doi.acm.org/10.1145/1791212.1791291
Online
ACM
New York City, NY, USA
IPSN '10
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
ACM
Stockholm, Sweden
9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
April 12-16, 2010
en
978-1-60558-988-6
http://doi.acm.org/10.1145/1791212.1791291
1
Jó AgilaBitsch Link
ThomasBretgeld
AndréGoliath
KlausWehrle
inproceedings
2010-bitsch-link-iq2s-burrowview
BurrowView - Seeing the world through the eyes of rats
2010
3
29
56 -- 61
For a long time, life sciences were restricted to look at animal habitats only post-factum. Pervasive computing puts us in the novel position to gain live views. In this paper we present BurrowView, an application that tracks the movement of rats in their natural habitat and reconstructs the underground tunnel system. To make reliable statements, special consideration has been taken with regard to the information quality. Our system is able to reconstruct paths up to a resolution of 20 cm, the length of a rat without its tail.
RatPack
fileadmin/papers/2010/2010-03-IQ2S-link-burrowview.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5470603
Online
IEEE
New York City, NY, USA
Proceedings of the Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010), Mannheim, Germany
IEEE
Mannheim, Germany
Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010)
March 29 to April 2, 2010
en
978-1-4244-6605-4
10.1109/PERCOMW.2010.5470603
1
Jó AgilaBitsch Link
GregorFabritius
Muhammad HamadAlizai
KlausWehrle
inproceedings
inproceedingsreference201001227195395138
Iterative Source-Channel Decoding with Cross-Layer Support for Wireless VoIP
2010
1
18
1
1-6
This paper presents a cross-layer approach for iterative source-channel decoding (ISCD) in wireless VoIP networks. The novelty of the proposed method is the incorporation of both, speech bits as well as protocol header bits, into the ISCD process. The header bits take the role of pilot bits having perfect reliability. These bits are distributed over the frame as strong supporting points for the MAP decoder which results in a significant enhancement of the output speech quality compared to the benchmark scheme using ISCD for speech only. For this approach, we exploit new cross-layer concepts that support the direct communication between non-adjacent layers. These concepts enable the iterative exchange of extrinsic information between the source decoder located on the application layer and the channel decoder located on the physical layer. This technique can also be applied to audio and video transmission.
refector
fileadmin/papers/2010/2010-01-scc-breddermann-iscd.pdf
CD-ROM / DVD-ROM
Rudolf Mathar, Christoph Ruland
VDE Verlag
Berlin, Germany
Proceedings of International ITG Conference on Source and Channel Coding
Proceedings of International ITG Conference on Source and Channel Coding
ITG
Siegen
International ITG Conference on Source and Channel Coding 2010
January 18-21, 2010
en
978-3-8007-3211-1
1
TobiasBreddermann
HelgeLueders
PeterVary
IsmetAktas
FlorianSchmidt
inbook
201001ThieleINTECHRatpack
Dynamic Wireless Sensor Networks for Animal Behavior Research
2010
1
629--644
RatPack
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-01-Thiele-INTECH-Ratpack.pdf
http://sciyo.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research
http://www.intechopen.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research
Online
Domenico Campolo
InTech
Vienna, Austria
32
Recent Advances in Biomedical Engineering
en
978-953-7619-57-2
1
JohannesThiele
Jó AgilaBitsch Link
OkuaryOsechas
HanspeterMallot
KlausWehrle
inbook
2010-kai-standardsedge_coordination
Coordination in ICT Standards Setting
2010
235-248
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
print
S. Bolin
The Bolin Group
San Francisco, CA, US
27
The Standards Edge - Unifier or Divider?
en
0974864854
KaiJakobs
KnutBlind
inproceedings
200912BitschSimBetAge
SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks
2009
12
1
13--18
In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.
RatPack
fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf
http://portal.acm.org/citation.cfm?id=1659029.1659034&coll=DL&dl=GUIDE&CFID=6806120&CFTOKEN=29162094
http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf
Online
Paulo Mendes, Oliver Marcé
ACM
New York City, NY, USA
U-NET '09
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy
ACM
Rome, Italy
1st ACM workshop on User-provided networking: challenges and opportunities
1 Dec. 2009
en
978-1-60558-750-9
http://doi.acm.org/10.1145/1659029.1659034
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
inproceedings
2009-sensys-alizai-burstytraffic
Bursty Traffic over Bursty Links
2009
11
71-84
wld
fileadmin/papers/2009/2009-alizai-sensys-bre.pdf
ACM
New York, NY, USA
Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA
Berkley, California
Sensys 09
November 2009
en
978-1-60558-519-2
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
techreport
200908alizaifgsnburstyrouting
Routing Over Bursty Wireless Links
2009
9
63-66
Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.
wld
fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf
doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
en
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
inproceedings
200907BitschMOBIQUITOUS09SimBetAge
SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking
2009
7
13
1--2
In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs.
poster and abstract
RatPack
fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363
Online
IEEE
New York City, NY, USA
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada
ICST/IEEE
Toronto, ON, Canada
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)
July 13-16, 2009
en
978-963-9799-59-2
10.4108/ICST.MOBIQUITOUS2009.7017
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
article
2009-thissen-JICWI-replication
Improving Quality of Web Services by using Replication
IADIS International Journal on WWW/Internet
2009
7
1
26-43
Online
IADIS Press
en
1645-7641
DirkThißen
ThomasBrambring
inproceedings
goetz2008adapt
ADAPT: A Semantics-Oriented Protocol Architecture
2008
12
10
5343/2008
287-292
Although modularized protocol frameworks are flexible and adaptive to the increasing heterogeneity of networking environments, it remains a challenge to automatically compose communication stacks from protocol modules. The typical static classification into network layers or class hierarchies cannot appropriately accommodate cross-cutting changes such as overlay routing or cross-layer signaling. In this paper, we discuss how protocol composition can be driven by functionality and demand at runtime based on extensible semantic models of protocols and their execution environment. Such an approach allows to reason about the functionality and quality of automatically composed and adapted protocol compounds and it is open to existing and future protocols.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-goetz-mobiarch-adapt.pdf
Print
Karin Anna Hummel and James P. G. Sterbenz
Springer-Verlag
Tiergartenstraße 17, 69121 Heidelberg, Germany
Lecture Notes in Computer Science
Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria
Vienna, Austria
3rd International Workshop on Self-Organizing Systems (IWSOS)
2008-12-10
en
978-3-540-92156-1
10.1007/978-3-540-92157-8\_27
1
StefanGötz
ChristianBeckel
TobiasHeer
KlausWehrle
inproceedings
2008-sensys-sasnauskas-kleenet
Poster Abstract: KleeNet - Automatic Bug Hunting in Sensor Network Applications
2008
11
425--426
We present KleeNet, a Klee based bug hunting tool for sensor network applications before deployment. KleeNet automatically tests code for all possible inputs, ensures memory safety, and integrates well into TinyOS based application development life cycle, making it easy for developers to test their applications.
bug finding, memory safety, tinyos, type safety
kleenet
fileadmin/papers/2008/2008-11-Sasnauskas-SenSys08-KleeNet.pdf
Print
ACM
New York, NY, USA
Proceedings of the 6th ACM conference on Embedded network sensor systems (SenSys'08), Raleigh, NC, USA
en
978-1-59593-990-6
http://doi.acm.org/10.1145/1460412.1460485
1
RaimondasSasnauskas
Jó AgilaBitsch Link
Muhammad HamadAlizai
KlausWehrle
inproceedings
200810ThieleSensors08RatPack
Smart Sensors for Small Rodent Observation
2008
10
26
709 -- 711
Working towards the observation of rats (and other small rodents) in the wild we have developed tools that will enable us to study their behavior using a wireless network of wearable sensor nodes. The space and weight constraints resulting from the size of the animals have led to simple but functional approaches for vocalization classification and position estimation. For the resulting data we have developed novel, delay-tolerant routing and collection strategies. These are expected to be used in a sparse, dynamic network resulting from various rats being tagged with our nodes and running around freely - an area that will eventually be too big to be covered solely by stationary data sinks. Furthermore, the system is designed to extract information on the social interactions between animals from the routing data. It currently works in an indoor environment and we are preparing it for tests in a controlled outdoor setup.
RatPack
fileadmin/papers/2008/2008-10-Thiele-Sensors08-RatPack.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4716540
Online
IEEE
New York City, NY, USA
Proceedings of IEEE Sensors 2008, Lecce, Italy
IEEE
Lecce, Italy
IEEE Sensors 2008
26-29 Oct. 2008
en
978-1-4244-2580-8
1930-0395
10.1109/ICSENS.2008.4716540
1
JohannesThiele
OkuaryOsechas
Jó AgilaBitsch Link
KlausWehrle
techreport
2008-fgsn-sasnauskas-kleenet
Bug Hunting in Sensor Network Applications
2008
9
Testing sensor network applications is an essential and a difficult task. Due to their distributed and faulty nature, severe resource constraints, unobservable interactions, and limited human interaction, sensor networks, make monitoring and debugging of applications strenuous and more challenging.
In this paper we present KleeNet - a Klee based platform independent bug hunting tool for sensor network applications before deployment - which can automatically test applications for all possible inputs, and hence, ensures memory safety for TinyOS based applications. Upon finding a bug,
KleeNet generates a concrete test case with real input values identifying a specific error path in a program. Additionally, we show that KleeNet integrates well into TinyOS application development life cycle with minimum manual effort, making it easy for developers to test their applications.
kleenet
fileadmin/papers/2008/2008-09-Sasnauskas-FGSN08-BugHunting.pdf
ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf
Print
Freie Universität Berlin, Institute of Computer Science
Berlin, Germany
Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany
Chair of Communication and Distributed Systems (ComSys)
en
1
RaimondasSasnauskas
Jó AgilaBitsch Link
Muhammad HamadAlizai
KlausWehrle
inproceedings
200808OsechasEMBC08RatPack
Ratpack: Wearable Sensor Networks for Animal Observation
2008
8
20
538--541
The goal of our project is to describe the behavior of rats. For this purpose we are using wireless sensor networks, monitoring various quantities that yield important information to complement current knowledge on the behavioral repertoire of rats. So far, on the sensing and processing side we have developed innovative, minimalist approaches pointing in two directions: vocalization analysis and movement tracking. On the data collection and routing side we have adapted to the known burrowing habits of rats by developing new methods for synchronization and data aggregation under the paradigm of sporadic connectivity in a sparse, dynamic network.
Animals;Behavior, Animal;Clothing;Equipment Design;Equipment Failure Analysis;Miniaturization;Monitoring, Ambulatory;Rats;Reproducibility of Results;Sensitivity and Specificity;Transducers;
ratpack
fileadmin/papers/2008/2008-08-Osechas-EMBC08-RatPack.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4649209
Online
The Printing House
Stoughton, WI, USA
Proceedings of the 30th Annual International IEEE Engineering in Medicine and Biology Conference, Vancouver, BC, Canada
IEEE EMBS
Vancouver, BC, Canada
Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE
20-25 Aug. 2008
en
978-1-4244-1814-5
1557-170X
10.1109/IEMBS.2008.4649209
1
OkuaryOsechas
JohannesThiele
Jó AgilaBitsch Link
KlausWehrle
inproceedings
200808BitschSIGCOMM08RatPack
RatPack: Communication in a Sparse Dynamic Network
2008
8
17
467--468
The goal of this pro ject is to investigate the behavior of wild living rats using sensor networks. The main challenge with respect to communication is the sparse and very dynamic network determined by the burrow dwelling behavior of rats, which makes delay tolerant data transmission schemes a necessity. The physical and computional restrictions in embedded devices make routing an interesting challenge for which we are currently developing new strategies.
ratpack
fileadmin/papers/2008/2008-08-Bitsch-SIGCOMM08-RatPack.pdf
http://conferences.sigcomm.org/sigcomm/2008/posters.php
http://www.worldcat.org/title/sigcomm-08-proceedings-of-the-2008-sigcomm-conference-and-co-located-workshops-nsdr08-wosn08-mobiarch08-netecon08-presto08-seattle-wa-usa-august-17-22-2008/oclc/300481768
Online
ACM
New York City, NY, USA
ACM SIGCOMM 2008 Poster Proceedings, Seattle, WA, USA
ACM
Seattle, WA, USA
ACM SIGCOMM 2008
August 17-22, 2008
en
978-1-60558-175-0
1
Jó AgilaBitsch Link
KlausWehrle
OkuaryOsechas
JohannesThiele
techreport
2008-fgsn-alizai-stle
Challenges in Short-term Wireless Link Quality Estimation
2008
7
27-30
wld
fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf
ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf
Print
Fachbereich Mathematik und Informatik
Berlin, Germany
Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks
FGSN 08
September 2010
en
1
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
AlexanderBecher
inproceedings
2008-becher-hotemnets-linkestimation
Towards Short-Term Wireless Link Quality Estimation
2008
6
3
1--5
Commonly, routing in sensor networks is limited to longterm stable links. Unstable links, although often promising to be of large routing progress, are not considered for packet forwarding as link estimators typically cannot handle their dynamics. In this paper we introduce short-term link estimation to capture link dynamics at a high resolution in time and to identify when these render a link temporarily reliable or unreliable. We identify such dynamics based on packet overhearing, predict short-term availability and unavailability, and adapt neighbor tables, thereby enlarging the set of links useable by any routing algorithm. Additionally, we show that short-term link estimation integrates seamlessly into today's sensor network link estimators and routing protocols.
wld
fileadmin/papers/2008/2008-becher-hotemnets-linkestimation.pdf
Online
ACM Press
New York, NY, USA
Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Charlottesville, VA, USA
Chalottesville, USA
Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08)
June 2-3, 2008
en
978-1-60558-209-2
1
AlexanderBecher
OlafLandsiedel
GeorgKunz
KlausWehrle
inbook
2008-thissen-LNCS-management
Service Management for Development Tools
2008
401-429
Print
M. Nagl, W. Marquardt
Springer
Lecture Notes in Computer Science 4970
Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support
en
978-3-540-70551-2
YuriBabich
OttoSpaniol
DirkThißen
inbook
2008-thissen-LNCS-synergy
Synergy by Integrating New Functionality
2008
519-526
Print
M. Nagl, W. Marquardt
Springer
Lecture Notes in Computer Science 4970
Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support
en
978-3-540-70551-2
SimonBecker
MarkusHeller
MatthiasJarke
WolfgangMarquardt
ManfredNagl
OttoSpaniol
DirkThißen
inproceedings
2008-thissen-ICEB-replication
Replication of Web Services for QoS Guarantees in Web Service Composition
2008
155-160
CD-ROM
INSTICC
Proceedings of the International Conference on e-Business (ICE-B 2008), Porto, Portugal
Porto, Portugal
International Conference on e-Business (ICE-B 2008)
en
978-989-8111-58-6
1
DirkThißen
ThomasBrambring
inproceedings
2008-thissen-ICWI-replication
Improving Quality of Web Services by using Replication
2008
283-290
CD-ROM
IADIS Press
Proceedings of the IADIS International Conference on WWW and Internet (ICWI 2008), Freiburg, Germany
Freiburg
IADIS International Conference on WWW and Internet (ICWI 2008)
2008
en
978-972-8924-68-3
1
DirkThißen
ThomasBrambring
inproceedings
200707BitschSNFGRatPack
Ratpack: Using Sensor Networks for Animal Observation
2007
7
16
2007-11
95 -- 97
The goal of this project is to describe the behaviour of rats. To study this behaviour, we will resort to the use of wireless sensor networks, monitoring various quantities that yield important information to complement current knowledge on the behavioural repertoire of rats. The challenges we face include data acquisition and processing on the one hand, as rat-borne sensor nodes will need to be small enough not to interfere with the rats' own activities, thus limiting the available memory and processing capabilities. Additionally, rats spend a significant amount of time underground, making data transmission and routing a very interesting challenge, for which we are currently developing novel strategies.
RatPack
fileadmin/papers/2007/2007-07-Bitsch-SNFG-RatPack.pdf
Print
Klaus Wehrle
RWTH Aachen University
Aachen, Germany
AIB
6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Aachen, Germany
GI/ITG Fachgruppe "Kommunikation und Verteilte Systeme"
Aachen, Germany
6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks"
July 16-17, 2007
en
0935-3232
1
Jó AgilaBitsch Link
KlausWehrle
OkuaryOsechas
JohannesThiele
HanspeterMallot
inproceedings
GarciaMorchonEtAl2007
Cooperative Security in Distributed Sensor Networks
2007
1
Print
IEEE
Washington, DC, USA
1
Proceedings of the third International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007
IEEE
CollaborateCom
en
978-1-4244-1318-8
1
OscarGarcia-Morchon
HeribertBaldus
TobiasHeer
KlausWehrle
inproceedings
200606LandsiedelRatWatch
Rat Watch: Using Sensor Networks for Animal Observation
2006
6
19
1
1--2
In an attempt to employ sensor network technology for animal observation, in particular of wild rats, we identified several restrictive shortcomings in existing sensor network research, which we discuss in this paper.
(Poster and Abstract)
RatPack
fileadmin/papers/2006/2006-06-Landsiedel-RatWatch.pdf
http://www.sics.se/realwsn06/program.html
Online
Pedro José Marron and Thiemo Voigt
SICS
Uppsala, Sweden
ACM Workshop on Real-World Wireless Sensor Networks (RealWSN) in conjunction with ACM MobiSys, Uppsala, Sweden
ACM
Uppsala, Sweden
ACM Workshop on Real-World Wireless Sensor Networks, REALWSN'06
June 19, 2006
en
1
OlafLandsiedel
Jó AgilaBitsch Link
KlausWehrle
JohannesThiele
HanspeterMallot
inproceedings
200602LandsiedelEWSNModularSN
Modular Communication Protocols for Sensor Networks
2006
2
13
507
22 -- 23
In this paper we present our ongoing work on modular communication protocols for sensor networks. Their modularity allows recomposing a protocol dynamically at runtime and adapting it to the changing needs of a sensor network. Compared to existing work, our componentization is fine grained and protocol independent, enabling a high degree of component reusability.
(Poster and Abstract)
fileadmin/papers/2006/2006-02-Landsiedel-EWSN-ModularSN.pdf
ftp://ftp.inf.ethz.ch/pub/publications/tech-reports/5xx/507.pdf
Technical Report
Online
Kay Römer and Holger Karl and Friedemann Matterns
Department of Computer Science, ETH Zurich
Zurich, Switzerland
Technical Report ETH Zurich / Dept. of Computer Science
European Workshop on Wireless Sensor Networks (EWSN 2006), Zurich Switzerland
EWSN
Zurich, Switzerland
3rd European Workshop on Wireless Sensor Networks (EWSN 2006)
February 13-15, 2006
en
1
OlafLandsiedel
Jó AgilaBitsch Link
KatharinaDenkinger
KlausWehrle
inproceedings
200504mongerinformatiktage
Eine strategieorientierte, modulare Simulationsumgebung für mobile Ad-Hoc-Szenarien
2005
Schloss Birlinghoven
Proceedings of GI-Informatiktage 2005
AndreasMonger
StefanieHofmann
JanBronni
MarcelKronfeld
inproceedings
2001-thissen-DSN-critical
Monitoring and Control of Critical Infrastructures
2001
2
B68-B69
Print
IEEE
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001), Fast Abstract Track, Göteborg, Sweden
Göteborg, Sweden
International Conference on Dependable Systems and Networks (DSN 2001)
en
0-7695-1101-5
1
RolandBüschkes
DirkThißen
HaiYu