% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-16 % Creation time: 11-52-44 % --- Number of references % 137 % @Inproceedings { 2024-wagner-madtls, title = {Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication}, year = {2024}, month = {7}, day = {1}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-wagner-madtls.pdf}, booktitle = {19th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS '24), Singapur}, event_place = {Singapur}, event_name = {ACM ASIA Conference on Computer and Communications Security (AsiaCCS)}, event_date = {July 1-5, 2024}, state = {unpublished}, reviewed = {1}, author = {Wagner, Eric and Heye, David and Serror, Martin and Kunze, Ike and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2024-kunze-spintrap, title = {SpinTrap: Catching Speeding QUIC Flows}, year = {2024}, month = {5}, day = {7}, publisher = {IEEE/IFIP}, booktitle = {Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24)}, event_name = {2024 IEEE/IFIP Network Operations and Management Symposium}, state = {accepted}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Tissen, Lars and Bode, Benedikt and Wehrle, Klaus} } @Inproceedings { 2024-kunze-civic, title = {In-Situ Model Validation for Continuous Processes Using In-Network Computing}, year = {2024}, month = {5}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-kunze-civic.pdf}, booktitle = {Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '24)}, state = {accepted}, reviewed = {1}, author = {Kunze, Ike and Scheurenberg, Dominik and Tirpitz, Liam and Geisler, Sandra and Wehrle, Klaus} } @Article { 2024_pennekamp_supply-chain-survey, title = {An Interdisciplinary Survey on Information Flows in Supply Chains}, journal = {ACM Computing Surveys}, year = {2024}, month = {2}, day = {1}, volume = {56}, number = {2}, abstract = {Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.}, keywords = {information flows; data communication; supply chain management; data security; data sharing; systematic literature review}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf}, publisher = {ACM}, ISSN = {0360-0300}, DOI = {10.1145/3606693}, reviewed = {1}, author = {Pennekamp, Jan and Matzutt, Roman and Klinkm{\"u}ller, Christopher and Bader, Lennart and Serror, Martin and Wagner, Eric and Malik, Sidra and Spi{\ss}, Maria and Rahn, Jessica and G{\"u}rpinar, Tan and Vlad, Eduard and Leemans, Sander J. J. and Kanhere, Salil S. and Stich, Volker and Wehrle, Klaus} } @Article { 2023_pennekamp_purchase_inquiries, title = {Offering Two-Way Privacy for Evolved Purchase Inquiries}, journal = {ACM Transactions on Internet Technology}, year = {2023}, month = {11}, day = {17}, volume = {23}, number = {4}, abstract = {Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today's established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches' scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.}, keywords = {bootstrapping procurement; secure industrial collaboration; private set intersection; homomorphic encryption; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-purchase-inquiries.pdf}, publisher = {ACM}, ISSN = {1533-5399}, DOI = {10.1145/3599968}, reviewed = {1}, author = {Pennekamp, Jan and Dahlmanns, Markus and Fuhrmann, Frederik and Heutmann, Timo and Kreppein, Alexander and Grunert, Dennis and Lange, Christoph and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2023_bader_reputation-systems, title = {Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation}, year = {2023}, month = {11}, abstract = {Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volatile supply chain networks introduce, (2) give an overview of the diverse landscape of privacy-preserving reputation systems and their properties, and (3) based on well-established concepts from supply chain information systems and cryptography, we further propose an initial concept that accounts for the aforementioned challenges by utilizing fully homomorphic encryption. For future work, we identify the need of evaluating whether novel systems address the supply chain-specific privacy and confidentiality needs.}, note = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST)}, keywords = {SCM; confidentiality; anonymity; voter; votee; FHE}, tags = {internet-of-production}, url = {https://jpennekamp.de/wp-content/papercite-data/pdf/bpt+23.pdf}, publisher = {Springer}, booktitle = {Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '23), November 14-17, 2023, Melbourne, VIC, Australia}, event_place = {Melbourne, VIC, Australia}, event_date = {November 14-17, 2023}, state = {accepted}, ISSN = {1867-8211}, reviewed = {1}, author = {Bader, Lennart and Pennekamp, Jan and Thevaraj, Emildeon and Spi{\ss}, Maria and Kanhere, Salil S. and Wehrle, Klaus} } @Inproceedings { 2023-kunze-spin-bit-in-the-wild, title = {Does It Spin? On the Adoption and Use of QUIC’s Spin Bit}, year = {2023}, month = {10}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-kunze-spin-bit-in-the-wild.pdf}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '23)}, event_name = {Internet Measurement Conference 2023}, DOI = {10.1145/3618257.3624844}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Wehrle, Klaus} } @Inproceedings { 2023-sander-quic-ecn, title = {ECN with QUIC: Challenges in the Wild}, year = {2023}, month = {10}, tags = {legato}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-sander-quic-ecn.pdf}, web_url = {https://arxiv.org/abs/2309.14273}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '23)}, event_name = {Internet Measurement Conference 2023}, ISBN = {979-8-4007-0382-9/23/10}, DOI = {10.1145/3618257.3624821}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Bl{\"o}cher, Leo and Kosek, Mike and Wehrle, Klaus} } @Inproceedings { 2023_wolsing_ensemble, title = {One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection}, year = {2023}, month = {9}, day = {25}, volume = {14345}, pages = {102-122}, abstract = {Industrial Intrusion Detection Systems (IIDSs) play a critical role in safeguarding Industrial Control Systems (ICSs) against targeted cyberattacks. Unsupervised anomaly detectors, capable of learning the expected behavior of physical processes, have proven effective in detecting even novel cyberattacks. While offering decent attack detection, these systems, however, still suffer from too many False-Positive Alarms (FPAs) that operators need to investigate, eventually leading to alarm fatigue. To address this issue, in this paper, we challenge the notion of relying on a single IIDS and explore the benefits of combining multiple IIDSs. To this end, we examine the concept of ensemble learning, where a collection of classifiers (IIDSs in our case) are combined to optimize attack detection and reduce FPAs. While training ensembles for supervised classifiers is relatively straightforward, retaining the unsupervised nature of IIDSs proves challenging. In that regard, novel time-aware ensemble methods that incorporate temporal correlations between alerts and transfer-learning to best utilize the scarce training data constitute viable solutions. By combining diverse IIDSs, the detection performance can be improved beyond the individual approaches with close to no FPAs, resulting in a promising path for strengthening ICS cybersecurity.}, note = {Lecture Notes in Computer Science (LNCS), Volume 14345}, keywords = {Intrusion Detection; Ensemble Learning; ICS}, tags = {internet-of-production, rfc}, url = {https://jpennekamp.de/wp-content/papercite-data/pdf/wkw+23.pdf}, publisher = {Springer}, booktitle = {Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS '23), September 25-29, 2023, The Hague, The Netherlands}, event_place = {The Hague, The Netherlands}, event_name = {28th European Symposium on Research in Computer Security (ESORICS '23)}, event_date = {September 25-29, 2023}, ISBN = {978-3-031-51475-3}, ISSN = {0302-9743}, DOI = {10.1007/978-3-031-51476-0_6}, reviewed = {1}, author = {Wolsing, Konrad and Kus, Dominik and Wagner, Eric and Pennekamp, Jan and Wehrle, Klaus and Henze, Martin} } @Article { Jakobs_2023_3, title = {Preserving the Royalty-Free Standards Ecosystem}, journal = {European Intellectual Property Review}, year = {2023}, month = {7}, volume = {45}, number = {7}, pages = {371-375}, abstract = {It has long been recognized in Europe and elsewhere that standards-development organizations (SDOs) may adopt policies that require their participants to license patents essential to the SDO’s standards (standards-essential patents or SEPs) to manufacturers of standardized products (“implementers”) on a royalty-free (RF) basis. This requirement contrasts with SDO policies that permit SEP holders to charge implementers monetary patent royalties, sometimes on terms that are specified as “fair, reasonable and nondiscriminatory” (FRAND). As demonstrated by two decades of intensive litigation around the world, FRAND royalties have given rise to intractable disputes regarding the manner in which such royalties should be calculated and adjudicated. In contrast, standards distributed on an RF basis are comparatively free from litigation and the attendant transaction costs. Accordingly, numerous SDOs around the world have adopted RF licensing policies and many widely adopted standards, including Bluetooth, USB, IPv6, HTTP, HTML and XML, are distributed on an RF basis. This note briefly discusses the commercial considerations surrounding RF standards, the relationship between RF standards and open source software (OSS) and the SDO policy mechanisms – including “universal reciprocity” -- that enable RF licensing to succeed in the marketplace.}, ISSN = {0142-0461}, DOI = {10.2139/ssrn.4235647}, reviewed = {1}, author = {Contreras, Jorge and Bekkers, Rudi and Biddle, Brad and Bonadio, Enrico and Carrier, Michael A. and Chao, Bernard and Duan, Charles and Gilbert, Richard and Henkel, Joachim and Hovenkamp, Erik and Husovec, Martin and Jakobs, Kai and Kim, Dong-hyu and Lemley, Mark A. and Love, Brian J. and McDonagh, Luke and Scott Morton, Fiona M. and Schultz, Jason and Simcoe, Timothy and Urban, Jennifer M. and Xiang, Joy Y} } @Inproceedings { 2023-grote-mvca-fairness, title = {Instant Messaging Meets Video Conferencing: Studying the Performance of IM Video Calls}, year = {2023}, month = {6}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-grote-mvca-fairness.pdf}, publisher = {IFIP/IEEE}, booktitle = {Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '23)}, ISBN = {978-3-903176-58-4}, DOI = {10.23919/TMA58422.2023.10199019}, reviewed = {1}, author = {Grote, Laurenz and Kunze, Ike and Sander, Constantin and Wehrle, Klaus} } @Article { 2023-circres-wu-comp-ecosystem, title = {Use of Computation Ecosystems to Analyze the Kidney-Heart Crosstalk}, journal = {Circulation research}, year = {2023}, month = {4}, day = {14}, volume = {132}, number = {8}, pages = {1084-1100}, misc2 = {Online}, language = {en}, DOI = {10.1161/CIRCRESAHA.123.321765}, reviewed = {1}, author = {Wu, Zhuojun and Lohm{\"o}ller, Johannes and Kuhl, Christiane and Wehrle, Klaus and Jankowski, Joachim} } @Incollection { 2023_pennekamp_crd-a.i, title = {Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead}, year = {2023}, month = {2}, day = {8}, pages = {35-60}, abstract = {The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.}, keywords = {Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_2}, reviewed = {1}, author = {Pennekamp, Jan and Belova, Anastasiia and Bergs, Thomas and Bodenbenner, Matthias and B{\"u}hrig-Polaczek, Andreas and Dahlmanns, Markus and Kunze, Ike and Kr{\"o}ger, Moritz and Geisler, Sandra and Henze, Martin and L{\"u}tticke, Daniel and Montavon, Benjamin and Niemietz, Philipp and Ortjohann, Lucia and Rudack, Maximilian and Schmitt, Robert H. and Vroomen, Uwe and Wehrle, Klaus and Zeng, Michael} } @Incollection { 2023_rueppel_crd-b2.ii, title = {Model-Based Controlling Approaches for Manufacturing Processes}, year = {2023}, month = {2}, day = {8}, pages = {221-246}, abstract = {The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).}, keywords = {Process control; Model-based control; Data aggregation; Model identification; Model optimization}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_7}, reviewed = {1}, author = {R{\"u}ppel, Adrian Karl and Ay, Muzaffer and Biernat, Benedikt and Kunze, Ike and Landwehr, Markus and Mann, Samuel and Pennekamp, Jan and Rabe, Pascal and Sanders, Mark P. and Scheurenberg, Dominik and Schiller, Sven and Xi, Tiandong and Abel, Dirk and Bergs, Thomas and Brecher, Christian and Reisgen, Uwe and Schmitt, Robert H. and Wehrle, Klaus} } @Incollection { 2023_klugewilkes_crd-b2.iv, title = {Modular Control and Services to Operate Line-less Mobile Assembly Systems}, year = {2023}, month = {2}, day = {8}, pages = {303-328}, abstract = {The increasing product variability and lack of skilled workers demand for autonomous, flexible production. Since assembly is considered a main cost driver and accounts for a major part of production time, research focuses on new technologies in assembly. The paradigm of Line-less Mobile Assembly Systems (LMAS) provides a solution for the future of assembly by mobilizing all resources. Thus, dynamic product routes through spatiotemporally configured assembly stations on a shop floor free of fixed obstacles are enabled. In this chapter, we present research focal points on different levels of LMAS, starting with the macroscopic level of formation planning, followed by the mesoscopic level of mobile robot control and multipurpose input devices and the microscopic level of services, such as interpreting autonomous decisions and in-network computing. We provide cross-level data and knowledge transfer through a novel ontology-based knowledge management. Overall, our work contributes to future safe and predictable human-robot collaboration in dynamic LMAS stations based on accurate online formation and motion planning of mobile robots, novel human-machine interfaces and networking technologies, as well as trustworthy AI-based decisions.}, keywords = {Lineless mobile assembly systems (LMAS); Formation planning; Online motion planning; In-network computing; Interpretable AI; Human-machine collaboration; Ontology-based knowledge management}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-klugewilkes-iop-b2.iv.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_13}, reviewed = {1}, author = {Kluge-Wilkes, Aline and Baier, Ralph and Gossen, Daniel and Kunze, Ike and M{\"u}ller, Aleksandra and Shahidi, Amir and Wolfschl{\"a}ger, Dominik and Brecher, Christian and Corves, Burkhard and H{\"u}sing, Mathias and Nitsch, Verena and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2022_kus_ensemble, title = {Poster: Ensemble Learning for Industrial Intrusion Detection}, year = {2022}, month = {12}, day = {8}, number = {RWTH-2022-10809}, abstract = {Industrial intrusion detection promises to protect networked industrial control systems by monitoring them and raising an alarm in case of suspicious behavior. Many monolithic intrusion detection systems are proposed in literature. These detectors are often specialized and, thus, work particularly well on certain types of attacks or monitor different parts of the system, e.g., the network or the physical process. Combining multiple such systems promises to leverage their joint strengths, allowing the detection of a wider range of attacks due to their diverse specializations and reducing false positives. We study this concept's feasibility with initial results of various methods to combine detectors.}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-ensemble-poster.pdf}, publisher = {RWTH Aachen University}, booktitle = {38th Annual Computer Security Applications Conference (ACSAC '22), December 5-9, 2022, Austin, TX, USA}, institution = {RWTH Aachen University}, event_place = {Austin, TX, USA}, event_name = {38th Annual Computer Security Applications Conference (ACSAC '22)}, event_date = {December 5-9, 2022}, DOI = {10.18154/RWTH-2022-10809}, reviewed = {1}, author = {Kus, Dominik and Wolsing, Konrad and Pennekamp, Jan and Wagner, Eric and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2022-kunze-coin-transport, title = {Evolving the End-to-End Transport Layer in Times of Emerging Computing In The Network (COIN)}, year = {2022}, month = {11}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kunze-coin-transport.pdf}, booktitle = {Proceedings of the 1st Workshop on New IP and Beyond, co-located with the 30th IEEE International Conference on Network Protocols}, event_place = {Lexington, Kentucky, USA}, event_name = {1st Workshop on New IP and Beyond, co-located with the 30th IEEE International Conference on Network Protocols}, event_date = {30 October, 2022}, DOI = {10.1109/ICNP55882.2022.9940379}, reviewed = {1}, author = {Kunze, Ike and Trossen, Dirk and Wehrle, Klaus} } @Inproceedings { 2022-sander-h3-prio-hol, title = {Analyzing the Influence of Resource Prioritization on HTTP/3 HOL Blocking and Performance}, year = {2022}, month = {6}, day = {27}, tags = {legato}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-sander-h3-prio-hol.pdf}, web_url2 = {https://tma.ifip.org/2022/wp-content/uploads/sites/11/2022/06/tma2022-paper28.pdf}, publisher = {IFIP}, booktitle = {Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '22)}, event_place = {Enschede}, event_name = {Network Traffic Measurement and Analysis Conference}, event_date = {27.06.22-30.06.22}, ISBN = {978-3-903176-47-8}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Wehrle, Klaus} } @Inproceedings { 2022_kus_iids_generalizability, title = {A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection}, year = {2022}, month = {5}, day = {30}, pages = {73-84}, abstract = {Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations. As manually creating these behavioral models is tedious and error-prone, research focuses on machine learning to train them automatically, achieving detection rates upwards of 99 \%. However, these approaches are typically trained not only on benign traffic but also on attacks and then evaluated against the same type of attack used for training. Hence, their actual, real-world performance on unknown (not trained on) attacks remains unclear. In turn, the reported near-perfect detection rates of machine learning-based intrusion detection might create a false sense of security. To assess this situation and clarify the real potential of machine learning-based industrial intrusion detection, we develop an evaluation methodology and examine multiple approaches from literature for their performance on unknown attacks (excluded from training). Our results highlight an ineffectiveness in detecting unknown attacks, with detection rates dropping to between 3.2 \% and 14.7 \% for some types of attacks. Moving forward, we derive recommendations for further research on machine learning-based approaches to ensure clarity on their ability to detect unknown attacks.}, keywords = {anomaly detection; machine learning; industrial control system}, tags = {internet-of-production, rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-kus-iids-generalizability.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM Cyber-Physical System Security Workshop (CPSS '22), co-located with the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS '22), May 30-June 3, 2022, Nagasaki, Japan}, ISBN = {978-1-4503-9176-4/22/05}, DOI = {10.1145/3494107.3522773}, reviewed = {1}, author = {Kus, Dominik and Wagner, Eric and Pennekamp, Jan and Wolsing, Konrad and Fink, Ina Berenice and Dahlmanns, Markus and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2022_matzutt_redactchain, title = {A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content}, year = {2022}, month = {5}, day = {3}, abstract = {Blockchains gained tremendous attention for their capability to provide immutable and decentralized event ledgers that can facilitate interactions between mutually distrusting parties. However, precisely this immutability and the openness of permissionless blockchains raised concerns about the consequences of illicit content being irreversibly stored on them. Related work coined the notion of redactable blockchains, which allow for removing illicit content from their history without affecting the blockchain's integrity. While honest users can safely prune identified content, current approaches either create trust issues by empowering fixed third parties to rewrite history, cannot react quickly to reported content due to using lengthy public votings, or create large per-redaction overheads. In this paper, we instead propose to outsource redactions to small and periodically exchanged juries, whose members can only jointly redact transactions using chameleon hash functions and threshold cryptography. Multiple juries are active at the same time to swiftly redact reported content. They oversee their activities via a global redaction log, which provides transparency and allows for appealing and reversing a rogue jury's decisions. Hence, our approach establishes a framework for the swift and transparent moderation of blockchain content. Our evaluation shows that our moderation scheme can be realized with feasible per-block and per-redaction overheads, i.e., the redaction capabilities do not impede the blockchain's normal operation.}, keywords = {redactable blockchain; illicit content; chameleon hash functions; threshold cryptography}, tags = {mynedata; impact-digital; digital-campus}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-matzutt-redactchain.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China}, event_place = {Shanghai, China}, event_date = {May 2-5, 2022}, ISBN = {978-1-6654-9538-7/22}, DOI = {10.1109/ICBC54727.2022.9805508}, reviewed = {1}, author = {Matzutt, Roman and Ahlrichs, Vincent and Pennekamp, Jan and Karwacik, Roman and Wehrle, Klaus} } @Article { 2022_brauner_iop, title = {A Computer Science Perspective on Digital Transformation in Production}, journal = {ACM Transactions on Internet of Things}, year = {2022}, month = {5}, day = {1}, volume = {3}, number = {2}, abstract = {The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.}, keywords = {Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf}, publisher = {ACM}, ISSN = {2691-1914}, DOI = {10.1145/3502265}, reviewed = {1}, author = {Brauner, Philipp and Dalibor, Manuela and Jarke, Matthias and Kunze, Ike and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Liebenberg, Martin and Michael, Judith and Pennekamp, Jan and Quix, Christoph and Rumpe, Bernhard and van der Aalst, Wil and Wehrle, Klaus and Wortmann, Andreas and Ziefle, Martina} } @Techreport { draft-irtf-coinrg-use-cases-02, title = {Use Cases for In-Network Computing}, year = {2022}, month = {3}, number = {draft-irtf-coinrg-use-cases-02}, note = {expires: 8 September 2022 (work in progress)}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf}, web_url = {https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/}, misc2 = {Online}, publisher = {IETF Trust}, series = {Internet Drafts}, organization = {Internet Engineering Task Force}, institution = {Internet Engineering Task Force}, author = {Kunze, Ike and Wehrle, Klaus and Trossen, Dirk and Montpetit, Marie-Jos{\'e} and de Foy, Xavier and Griffin, David and Rio, Miguel} } @Inproceedings { 2021_pennekamp_laser, title = {Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use}, year = {2021}, month = {12}, day = {21}, abstract = {Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base. Background. As part of our collaborative research of advancing the scope of industrial applications through cybersecurity and privacy, we identified a set of common challenges and pitfalls that surface in such applied interdisciplinary collaborations. Aim. Our goal with this paper is to support researchers in the emerging field of cybersecurity in industrial settings by formalizing our experiences as reference for other research efforts, in industry and academia alike. Method. Based on our experience, we derived a process cycle of performing such interdisciplinary research, from the initial idea to the eventual dissemination and paper writing. This presented methodology strives to successfully bootstrap further research and to encourage further work in this emerging area. Results. Apart from our newly proposed process cycle, we report on our experiences and conduct a case study applying this methodology, raising awareness for challenges in cybersecurity research for industrial applications. We further detail the interplay between our process cycle and the data lifecycle in applied research data management. Finally, we augment our discussion with an industrial as well as an academic view on this research area and highlight that both areas still have to overcome significant challenges to sustainably and securely advance industrial applications. Conclusions. With our proposed process cycle for interdisciplinary research in the intersection of cybersecurity and industrial application, we provide a foundation for further research. We look forward to promising research initiatives, projects, and directions that emerge based on our methodological work.}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-laser-collaboration.pdf}, publisher = {ACSA}, booktitle = {Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), co-located with the 36th Annual Computer Security Applications Conference (ACSAC '20), December 7-11, 2020, Austin, TX, USA}, event_place = {Austin, TX, USA}, event_name = {Learning from Authoritative Security Experiment Results (LASER '20)}, event_date = {December 8, 2020}, ISBN = {978-1-891562-81-5}, DOI = {10.14722/laser-acsac.2020.23088}, reviewed = {1}, author = {Pennekamp, Jan and Buchholz, Erik and Dahlmanns, Markus and Kunze, Ike and Braun, Stefan and Wagner, Eric and Brockmann, Matthias and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2021_kiesel_5g, title = {Development of a Model to Evaluate the Potential of 5G Technology for Latency-Critical Applications in Production}, year = {2021}, month = {12}, day = {15}, pages = {739-744}, abstract = {Latency-critical applications in production promise to be essential enablers for performance improvement in production. However, they require the right and often wireless communication system. 5G technology appears to be an effective way to achieve communication system for these applications. Its estimated economic benefit on production gross domestic product is immense ($740 billion Euro until 2030). However, 55\% of production companies state that 5G technology deployment is currently not a subject matter for them and mainly state the lack of knowledge on benefits as a reason. Currently, it is missing an approach or model for a use case specific, data-based evaluation of 5G technology influence on the performance of production applications. Therefore, this paper presents a model to evaluate the potential of 5G technology for latency-critical applications in production. First, we derive requirements for the model to fulfill the decision-makers' needs. Second, we analyze existing evaluation approaches regarding their fulfillment of the derived requirements. Third, based on outlined research gaps, we develop a model fulfilling the requirements. Fourth, we give an outlook for further research needs.}, keywords = {5G technology; latency-critical applications; production; evaluation model}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kiesel-5g-model.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 28th IEEE International Conference on Industrial Engineering and Engineering Management (IEEM '21), December 13-16, 2021, Singapore, Singapore}, event_place = {Singapore, Singapore}, event_date = {December 13-16, 2021}, ISBN = {978-1-6654-3771-4}, DOI = {10.1109/IEEM50564.2021.9673074}, reviewed = {1}, author = {Kiesel, Raphael and Boehm, Falk and Pennekamp, Jan and Schmitt, Robert H.} } @Inproceedings { 2021-krude-nfp-pred, title = {Determination of Throughput Guarantees for Processor-based SmartNICs}, year = {2021}, month = {12}, day = {7}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-krude-nfp-pred.pdf}, publisher = {ACM}, booktitle = {The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21)}, ISBN = {978-1-4503-9098-9/21/12}, DOI = {10.1145/3485983.3494842}, reviewed = {1}, author = {Krude, Johannes and R{\"u}th, Jan and Schemmel, Daniel and Rath, Felix and Folbort, Iohannes-Heorh and Wehrle, Klaus} } @Inproceedings { 2021-kunze-spin-tracker, title = {Tracking the QUIC Spin Bit on Tofino}, year = {2021}, month = {12}, day = {7}, pages = {15–21}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-spin-tracker.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ '21)}, ISBN = {9781450391351}, DOI = {10.1145/3488660.3493804}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021_pennekamp_bootstrapping, title = {Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships}, year = {2021}, month = {11}, day = {15}, number = {RWTH-2021-09499}, abstract = {In addition to quality improvements and cost reductions, dynamic and flexible business relationships are expected to become more important in the future to account for specific customer change requests or small-batch production. Today, despite reservation, sensitive information must be shared upfront between buyers and sellers. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness following information leaks or breaches of their privacy. To address this issue, the concepts of confidential computing and cloud computing come to mind as they promise to offer scalable approaches that preserve the privacy of participating companies. In particular, designs building on confidential computing can help to technically enforce privacy. Moreover, cloud computing constitutes an elegant design choice to scale these novel protocols to industry needs while limiting the setup and management overhead for practitioners. Thus, novel approaches in this area can advance the status quo of bootstrapping new relationships as they provide privacy-preserving alternatives that are suitable for immediate deployment.}, keywords = {bootstrapping procurement; business relationships; secure industrial collaboration; privacy; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-bootstrapping.pdf}, publisher = {RWTH Aachen University}, booktitle = {Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea}, institution = {RWTH Aachen University}, event_place = {Seoul, Korea}, event_date = {November 14, 2021}, DOI = {10.18154/RWTH-2021-09499}, author = {Pennekamp, Jan and Fuhrmann, Frederik and Dahlmanns, Markus and Heutmann, Timo and Kreppein, Alexander and Grunert, Dennis and Lange, Christoph and Schmitt, Robert H. and Wehrle, Klaus} } @Article { 2021_kretschmer_cookies, title = {Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web}, journal = {ACM Transactions on the Web}, year = {2021}, month = {11}, day = {1}, volume = {15}, number = {4}, abstract = {The General Data Protection Regulation (GDPR) is in effect since May of 2018. As one of the most comprehensive pieces of legislation concerning privacy, it sparked a lot of discussion on the effect it would have on users and providers of online services in particular, due to the large amount of personal data processed in this context. Almost three years later, we are interested in revisiting this question to summarize the impact this new regulation has had on actors in the World Wide Web. Using Scopus, we obtain a vast corpus of academic work to survey studies related to changes on websites since and around the time, the GDPR went into force. Our findings show that the emphasis on privacy increased w.r.t. online services, but plenty potential for improvements remains. Although online services are on average more transparent regarding data processing practices in their public data policies, a majority of these policies still either lack information required by the GDPR (e.g., contact information for users to file privacy inquiries), or do not provide this information in a user-friendly form. Additionally, we summarize that online services more often provide means for their users to opt out of data processing, but regularly obstruct convenient access to such means through unnecessarily complex and sometimes illegitimate interface design. Our survey further details that this situation contradicts the preferences expressed by users both verbally and through their actions, and researchers have proposed multiple approaches to facilitate GDPR-conform data processing without negatively impacting the user experience. Thus, we compiled reoccurring points of criticism by privacy researchers and data protection authorities into a list of four guidelines for service providers to consider.}, keywords = {Cookies; Privacy; GDPR; Web; Privacy Legislation; Fingerprinting}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kretschmer-tweb-cookies.pdf}, publisher = {ACM}, ISSN = {1559-1131}, DOI = {10.1145/3466722}, reviewed = {1}, author = {Kretschmer, Michael and Pennekamp, Jan and Wehrle, Klaus} } @Techreport { draft-kunze-coinrg-transport-issues-05, title = {Transport Protocol Issues of In-Network Computing Systems}, year = {2021}, month = {10}, number = {draft-kunze-coinrg-transport-issues-05}, note = {Expires: 28 April 2022 (work in progress)}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-kunze-coinrg-transport-issues-05.pdf}, web_url = {https://datatracker.ietf.org/doc/draft-kunze-coinrg-transport-issues/}, publisher = {IETF Trust}, series = {Internet Drafts}, organization = {Internet Engineering Task Force}, institution = {Internet Engineering Task Force}, author = {Kunze, Ike and Wehrle, Klaus and Trossen, Dirk} } @Article { 2021_pennekamp_accountable_manufacturing, title = {The Road to Accountable and Dependable Manufacturing}, journal = {Automation}, year = {2021}, month = {9}, day = {13}, volume = {2}, number = {3}, pages = {202-219}, abstract = {The Internet of Things provides manufacturing with rich data for increased automation. Beyond company-internal data exploitation, the sharing of product and manufacturing process data along and across supply chains enables more efficient production flows and product lifecycle management. Even more, data-based automation facilitates short-lived ad hoc collaborations, realizing highly dynamic business relationships for sustainable exploitation of production resources and capacities. However, the sharing and use of business data across manufacturers and with end customers add requirements on data accountability, verifiability, and reliability and needs to consider security and privacy demands. While research has already identified blockchain technology as a key technology to address these challenges, current solutions mainly evolve around logistics or focus on established business relationships instead of automated but highly dynamic collaborations that cannot draw upon long-term trust relationships. We identify three open research areas on the road to such a truly accountable and dependable manufacturing enabled by blockchain technology: blockchain-inherent challenges, scenario-driven challenges, and socio-economic challenges. Especially tackling the scenario-driven challenges, we discuss requirements and options for realizing a blockchain-based trustworthy information store and outline its use for automation to achieve a reliable sharing of product information, efficient and dependable collaboration, and dynamic distributed markets without requiring established long-term trust.}, keywords = {blockchain; supply chain management; Industry 4.0; manufacturing; secure industrial collaboration; scalability; Industrial Internet of Things; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-manufacturing.pdf}, publisher = {MDPI}, ISSN = {2673-4052}, DOI = {10.3390/automation2030013}, reviewed = {1}, author = {Pennekamp, Jan and Matzutt, Roman and Kanhere, Salil S. and Hiller, Jens and Wehrle, Klaus} } @Article { 2021_matzutt_coinprune_v2, title = {CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively}, journal = {IEEE Transactions on Network and Service Management}, year = {2021}, month = {9}, day = {10}, volume = {18}, number = {3}, pages = {3064-3078}, abstract = {Popular cryptocurrencies continue to face serious scalability issues due to their ever-growing blockchains. Thus, modern blockchain designs began to prune old blocks and rely on recent snapshots for their bootstrapping processes instead. Unfortunately, established systems are often considered incapable of adopting these improvements. In this work, we present CoinPrune, our block-pruning scheme with full Bitcoin compatibility, to revise this popular belief. CoinPrune bootstraps joining nodes via snapshots that are periodically created from Bitcoin's set of unspent transaction outputs (UTXO set). Our scheme establishes trust in these snapshots by relying on CoinPrune-supporting miners to mutually reaffirm a snapshot's correctness on the blockchain. This way, snapshots remain trustworthy even if adversaries attempt to tamper with them. Our scheme maintains its retrospective deployability by relying on positive feedback only, i.e., blocks containing invalid reaffirmations are not rejected, but invalid reaffirmations are outpaced by the benign ones created by an honest majority among CoinPrune-supporting miners. Already today, CoinPrune reduces the storage requirements for Bitcoin nodes by two orders of magnitude, as joining nodes need to fetch and process only 6 GiB instead of 271 GiB of data in our evaluation, reducing the synchronization time of powerful devices from currently 7 h to 51 min, with even larger potential drops for less powerful devices. CoinPrune is further aware of higher-level application data, i.e., it conserves otherwise pruned application data and allows nodes to obfuscate objectionable and potentially illegal blockchain content from their UTXO set and the snapshots they distribute.}, keywords = {blockchain; block pruning; synchronization; bootstrapping; scalability; velvet fork; Bitcoin}, tags = {mynedata; impact_digital; digital_campus}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-matzutt-coinprune-v2.pdf}, language = {English}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2021.3073270}, reviewed = {1}, author = {Matzutt, Roman and Kalde, Benedikt and Pennekamp, Jan and Drichel, Arthur and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2021-kunze-efm-evaluation, title = {L, Q, R, and T - Which Spin Bit Cousin Is Here to Stay?}, year = {2021}, month = {7}, pages = {22 - 28}, url = {/fileadmin/papers/2021/2021-kunze-efm-evaluation.pdf}, publisher = {ACM}, booktitle = {ANRW '21: Proceedings of the Applied Networking Research Workshop}, event_place = {Virtual Event}, event_name = {Applied Networking Research Workshop (ANRW '21)}, event_date = {July 2021}, DOI = {10.1145/3472305.3472319}, reviewed = {1}, author = {Kunze, Ike and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021-kunze-signal-detection, title = {Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing}, year = {2021}, month = {6}, day = {10}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-signal-detection.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE)}, ISBN = {978-1-7281-9023-5}, ISSN = {2163-5145}, DOI = {10.1109/ISIE45552.2021.9576221}, reviewed = {1}, author = {Kunze, Ike and Niemietz, Philipp and Tirpitz, Liam and Glebke, Ren{\'e} and Trauth, Daniel and Bergs, Thomas and Wehrle, Klaus} } @Inproceedings { 2021-glebke-service-based-forwarding, title = {Service-based Forwarding via Programmable Dataplanes}, year = {2021}, month = {6}, day = {10}, tags = {reflexes}, url = {/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)}, ISBN = {978-1-6654-4005-9}, ISSN = {2325-5609}, DOI = {10.1109/HPSR52026.2021.9481814}, reviewed = {1}, author = {Glebke, Ren{\'e} and Trossen, Dirk and Kunze, Ike and Lou, David and R{\"u}th, Jan and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2021-kunze-coordinate-transformation, title = {Investigating the Applicability of In-Network Computing to Industrial Scenarios}, year = {2021}, month = {5}, day = {11}, pages = {334-340}, keywords = {in-network computing; latency; approximation}, tags = {internet-of-production,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21)}, ISBN = {978-1-7281-6207-2}, DOI = {10.1109/ICPS49255.2021.9468247}, reviewed = {1}, author = {Kunze, Ike and Glebke, Ren{\'e} and Scheiper, Jan and Bodenbenner, Matthias and Schmitt, Robert H. and Wehrle, Klaus} } @Article { 2021_buckhorst_lmas, title = {Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production}, journal = {Procedia CIRP}, year = {2021}, month = {5}, day = {3}, volume = {99}, pages = {448-453}, abstract = {Assembly systems must provide maximum flexibility qualified by organization and technology to offer cost-compliant performance features to differentiate themselves from competitors in buyers' markets. By mobilization of multipurpose resources and dynamic planning, Line-less Mobile Assembly Systems (LMASs) offer organizational reconfigurability. By proposing a holarchy to combine LMASs with the concept of an Internet of Production (IoP), we enable LMASs to source valuable information from cross-level production networks, physical resources, software nodes, and data stores that are interconnected in an IoP. The presented holarchy provides a concept of how to address future challenges, meet the requirements of shorter lead times, and unique lifecycle support. The paper suggests an application of decision making, distributed sensor services, recommender-based data reduction, and in-network computing while considering safety and human usability alike.}, note = {Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME '20), July 14-17, 2020, Gulf of Naples, Italy}, keywords = {Internet of Production; Line-less Mobile Assembly System; Industrial Assembly; Smart Factory}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-buckhorst-holarchy.pdf}, publisher = {Elsevier}, event_place = {Gulf of Naples, Italy}, event_date = {July 14-17, 2020}, ISSN = {2212-8271}, DOI = {10.1016/j.procir.2021.03.064}, reviewed = {1}, author = {Buckhorst, Armin F. and Montavon, Benjamin and Wolfschl{\"a}ger, Dominik and Buchsbaum, Melanie and Shahidi, Amir and Petruck, Henning and Kunze, Ike and Pennekamp, Jan and Brecher, Christian and H{\"u}sing, Mathias and Corves, Burkhard and Nitsch, Verena and Wehrle, Klaus and Schmitt, Robert H.} } @Article { 2021_bader_privaccichain, title = {Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability}, journal = {Information Processing \& Management}, year = {2021}, month = {5}, day = {1}, volume = {58}, number = {3}, abstract = {The benefits of information sharing along supply chains are well known for improving productivity and reducing costs. However, with the shift towards more dynamic and flexible supply chains, privacy concerns severely challenge the required information retrieval. A lack of trust between the different involved stakeholders inhibits advanced, multi-hop information flows, as valuable information for tracking and tracing products and parts is either unavailable or only retained locally. Our extensive literature review of previous approaches shows that these needs for cross-company information retrieval are widely acknowledged, but related work currently only addresses them insufficiently. To overcome these concerns, we present PrivAccIChain, a secure, privacy-preserving architecture for improving the multi-hop information retrieval with stakeholder accountability along supply chains. To address use case-specific needs, we particularly introduce an adaptable configuration of transparency and data privacy within our design. Hence, we enable the benefits of information sharing as well as multi-hop tracking and tracing even in supply chains that include mutually distrusting stakeholders. We evaluate the performance of PrivAccIChain and demonstrate its real-world feasibility based on the information of a purchasable automobile, the e.GO Life. We further conduct an in-depth security analysis and propose tunable mitigations against common attacks. As such, we attest PrivAccIChain's practicability for information management even in complex supply chains with flexible and dynamic business relationships.}, keywords = {multi-hop collaboration; tracking and tracing; Internet of Production; e.GO; attribute-based encryption}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-bader-ipm-privaccichain.pdf}, publisher = {Elsevier}, ISSN = {0306-4573}, DOI = {10.1016/j.ipm.2021.102529}, reviewed = {1}, author = {Bader, Lennart and Pennekamp, Jan and Matzutt, Roman and Hedderich, David and Kowalski, Markus and Lücken, Volker and Wehrle, Klaus} } @Inproceedings { 2021-kunze-aqm-tofino-p4, title = {Tofino + P4: A Strong Compound for AQM on High-Speed Networks?}, year = {2021}, month = {5}, pages = {72-80}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf}, publisher = {IFIP/IEEE}, booktitle = {Proceedings of the International Symposium on Integrated Network Management (IM '21)}, event_place = {Virtual Event}, event_name = {International Symposium on Integrated Network Management (IM '21)}, event_date = {May 2021}, ISBN = {978-1-7281-9041-9}, reviewed = {1}, author = {Kunze, Ike and Gunz, Moritz and Saam, David and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021-sander-zoom-cc, title = {Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM}, year = {2021}, month = {3}, tags = {internet-of-production}, url = {/fileadmin/papers/2021/2021-sander-zoom-fairness-aqm.pdf}, web_url = {https://arxiv.org/abs/2107.00904}, publisher = {Springer}, booktitle = {Proceedings of the Passive and Active Measurement Conference (PAM '21)}, event_name = {Passive and Active Measurement Conference (PAM 2021)}, DOI = {10.1007/978-3-030-72582-2_1}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2020-kirchhof-wowmom-ccncps, title = {Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation}, year = {2020}, month = {8}, day = {31}, tags = {internet-of-production, reflexes}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kirchhof-wireless-mac-improvements.pdf}, publisher = {IEEE Computer Society}, howpublished = {online}, booktitle = {International Symposium on a World of Wireless, Mobile and Multimedia Networks: Workshop on Communication, Computing, and Networking in Cyber Physical Systems (WoWMoM-CCNCPS'2020), August 31 - September 3, 2020, Cork, Ireland}, event_place = {Cork, Ireland}, event_date = {August 31 - September 3, 2020}, DOI = {10.1109/WoWMoM49955.2020.00068}, reviewed = {1}, author = {Kirchhof, J{\"o}rg Christian and Serror, Martin and Glebke, Ren{\'e} and Wehrle, Klaus} } @Article { 2020_niemietz_stamping, title = {Stamping Process Modelling in an Internet of Production}, journal = {Procedia Manufacturing}, year = {2020}, month = {7}, day = {11}, volume = {49}, pages = {61-68}, abstract = {Sharing data between companies throughout the supply chain is expected to be beneficial for product quality as well as for the economical savings in the manufacturing industry. To utilize the available data in the vision of an Internet of Production (IoP) a precise condition monitoring of manufacturing and production processes that facilitates the quantification of influences throughout the supply chain is inevitable. In this paper, we consider stamping processes in the context of an Internet of Production and the preliminaries for analytical models that utilize the ever-increasing available data. Three research objectives to cope with the amount of data and for a methodology to monitor, analyze and evaluate the influence of available data onto stamping processes have been identified: (i) State detection based on cyclic sensor signals, (ii) mapping of in- and output parameter variations onto process states, and (iii) models for edge and in-network computing approaches. After discussing state-of-the-art approaches to monitor stamping processes and the introduction of the fineblanking process as an exemplary stamping process, a research roadmap for an IoP enabling modeling framework is presented.}, note = {Proceedings of the 8th International Conference on Through-Life Engineering Service (TESConf '19), October 27-29, 2019, Cleveland, OH, USA}, keywords = {Stamping Process; Industry 4.0; Fine-blanking; Internet of production; Condition monitoring; Data analytics}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-niemietz-stamping-modelling.pdf}, publisher = {Elsevier}, event_place = {Cleveland, OH, USA}, event_date = {October 27-29, 2019}, ISSN = {2351-9789}, DOI = {10.1016/j.promfg.2020.06.012}, reviewed = {1}, author = {Niemietz, Philipp and Pennekamp, Jan and Kunze, Ike and Trauth, Daniel and Wehrle, Klaus and Bergs, Thomas} } @Proceedings { 2020-jacobs-euras, title = {Proceedings 25th EURAS Annual Standardisation Conference ''Standards for Digital Transformation: Blockchain and Innovation'' : should have been held 10-12 June 2020, Glasgow, Scotland}, year = {2020}, month = {6}, day = {29}, volume = {15}, editor = {Kai Jakobs, Dong-hyu Kim}, publisher = {Mainz Publishers}, series = {EURAS Contributions to Standardisation Research}, ISBN = {9783958863552}, author = {Jakobs, Kai and Kim, Dong-hyu} } @Inproceedings { 2020_matzutt_coinprune, title = {How to Securely Prune Bitcoin’s Blockchain}, year = {2020}, month = {6}, day = {24}, pages = {298-306}, abstract = {Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day. Despite the benefits of its blockchain, Bitcoin still faces serious scalability issues, most importantly its ever-increasing blockchain size. While alternative designs introduced schemes to periodically create snapshots and thereafter prune older blocks, already-deployed systems such as Bitcoin are often considered incapable of adopting corresponding approaches. In this work, we revise this popular belief and present CoinPrune, a snapshot-based pruning scheme that is fully compatible with Bitcoin. CoinPrune can be deployed through an opt-in velvet fork, i.e., without impeding the established Bitcoin network. By requiring miners to publicly announce and jointly reaffirm recent snapshots on the blockchain, CoinPrune establishes trust into the snapshots' correctness even in the presence of powerful adversaries. Our evaluation shows that CoinPrune reduces the storage requirements of Bitcoin already by two orders of magnitude today, with further relative savings as the blockchain grows. In our experiments, nodes only have to fetch and process 5 GiB instead of 230 GiB of data when joining the network, reducing the synchronization time on powerful devices from currently 5 h to 46 min, with even more savings for less powerful devices.}, keywords = {blockchain; block pruning; synchronization; bootstrapping; scalability; velvet fork; Bitcoin}, tags = {mynedata; impact_digital; digital_campus}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-matzutt-coinprune.pdf}, web_url = {https://coinprune.comsys.rwth-aachen.de}, publisher = {IEEE}, booktitle = {Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France}, event_place = {Paris, France}, event_name = {NETWORKING 2020}, event_date = {June 22-26, 2020}, ISBN = {978-3-903176-28-7}, reviewed = {1}, author = {Matzutt, Roman and Kalde, Benedikt and Pennekamp, Jan and Drichel, Arthur and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2020-mann-ur-weldseamstudy, title = {Study on weld seam geometry control for connected gas metal arc welding systems}, year = {2020}, month = {6}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf}, booktitle = {Proceedings of the 2020 Internal Conference on Ubiquitous Robots}, event_name = {Internal Conference on Ubiquitous Robots}, event_date = {June 22-26, 2020}, DOI = {10.1109/UR49135.2020.9144839}, reviewed = {1}, author = {Mann, Samuel and Glebke, Ren{\'e} and Kunze, Ike and Scheurenberg, Dominik and Sharma, Rahul and Reisgen, Uwe and Wehrle, Klaus and Abel, Dirk} } @Article { 2020_gleim_factDAG, title = {FactDAG: Formalizing Data Interoperability in an Internet of Production}, journal = {IEEE Internet of Things Journal}, year = {2020}, month = {4}, day = {14}, volume = {7}, number = {4}, pages = {3243-3253}, abstract = {In the production industry, the volume, variety and velocity of data as well as the number of deployed protocols increase exponentially due to the influences of IoT advances. While hundreds of isolated solutions exist to utilize this data, e.g., optimizing processes or monitoring machine conditions, the lack of a unified data handling and exchange mechanism hinders the implementation of approaches to improve the quality of decisions and processes in such an interconnected environment. The vision of an Internet of Production promises the establishment of a Worldwide Lab, where data from every process in the network can be utilized, even interorganizational and across domains. While numerous existing approaches consider interoperability from an interface and communication system perspective, fundamental questions of data and information interoperability remain insufficiently addressed. In this paper, we identify ten key issues, derived from three distinctive real-world use cases, that hinder large-scale data interoperability for industrial processes. Based on these issues we derive a set of five key requirements for future (IoT) data layers, building upon the FAIR data principles. We propose to address them by creating FactDAG, a conceptual data layer model for maintaining a provenance-based, directed acyclic graph of facts, inspired by successful distributed version-control and collaboration systems. Eventually, such a standardization should greatly shape the future of interoperability in an interconnected production industry.}, keywords = {Data Management; Data Versioning; Interoperability; Industrial Internet of Things; Worldwide Lab}, tags = {internet-of-production}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-iotj-iop-interoperability.pdf}, publisher = {IEEE}, ISSN = {2327-4662}, DOI = {10.1109/JIOT.2020.2966402}, reviewed = {1}, author = {Gleim, Lars and Pennekamp, Jan and Liebenberg, Martin and Buchsbaum, Melanie and Niemietz, Philipp and Knape, Simon and Epple, Alexander and Storms, Simon and Trauth, Daniel and Bergs, Thomas and Brecher, Christian and Decker, Stefan and Lakemeyer, Gerhard and Wehrle, Klaus} } @Inproceedings { 2020-kosek-tcp-conformance, title = {MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild}, year = {2020}, month = {3}, day = {30}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf}, web_url2 = {https://arxiv.org/abs/2002.05400}, publisher = {Springer}, booktitle = {Proceedings of the Passive and Active Measurement Conference (PAM '20)}, event_place = {Eugene, Oregon, USA}, event_name = {Passive and Active Measurement Conference (PAM 2020)}, event_date = {30.03.2020 - 31.03.2020}, language = {en}, DOI = {https://doi.org/10.1007/978-3-030-44081-7_8}, reviewed = {1}, author = {Kosek, Mike and Bl{\"o}cher, Leo and R{\"u}th, Jan and Zimmermann, Torsten and Hohlfeld, Oliver} } @Article { 2020-wehrle-digitalshadows, title = {Mit ''Digitalen Schatten'' Daten verdichten und darstellen : Der Exzellenzcluster ''Internet der Produktion'' forscht {\"u}ber die Produktionstechnik hinaus}, journal = {Der Profilbereich ''Information \& Communication Technology''}, year = {2020}, ISSN = {0179-079X}, DOI = {10.18154/RWTH-2021-02496}, author = {Jarke, Matthias and van der Aalst, Wil and Brecher, Christian and Brockmann, Matthias and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Rumpe, Bernhard and Schuh, G{\"u}nther and Wehrle, Klaus and Ziefle, Martina} } @Article { 2019-kunze-ccwild-tnsm, title = {Congestion Control in the Wild - Investigating Content Provider Fairness}, journal = {IEEE Transactions on Network and Service Management}, year = {2019}, month = {12}, day = {27}, volume = {17}, number = {2}, pages = {1224 - 1238}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-kunze-ccwild-tnsm.pdf}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2019.2962607}, reviewed = {1}, author = {Kunze, Ike and R{\"u}th, Jan and Hohlfeld, Oliver} } @Inproceedings { 2019-krude-online-reprogramming, title = {Online Reprogrammable Multi Tenant Switches}, year = {2019}, month = {12}, day = {9}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-krude-online-reprogramming.pdf}, publisher = {ACM}, booktitle = {1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)}, ISBN = {978-1-4503-7000-4/19/12}, DOI = {10.1145/3359993.3366643}, reviewed = {1}, author = {Krude, Johannes and Hofmann, Jaco and Eichholz, Matthias and Wehrle, Klaus and Koch, Andreas and Mezini, Mira} } @Inproceedings { 2019-glebke-in-network-cv, title = {Towards Executing Computer Vision Functionality on Programmable Network Devices}, year = {2019}, month = {12}, day = {9}, tags = {reflexes,maki,internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)}, language = {en}, ISBN = {978-1-4503-7000-4/19/12}, DOI = {10.1145/3359993.3366646}, reviewed = {1}, author = {Glebke, Ren{\'e} and Krude, Johannes and Kunze, Ike and R{\"u}th, Jan and Senger, Felix and Wehrle, Klaus} } @Inproceedings { 2019-hiller-aeit-regaining, title = {Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids}, year = {2019}, month = {9}, abstract = {Smart Grids require extensive communication to enable safe and stable energy supply in the age of decentralized and dynamic energy production and consumption. To protect the communication in this critical infrastructure, public authorities mandate smart meter gateways (SMGWs) to intercept all inbound and outbound communication of premises such as a factory or smart home, and forward the communication data on secure channels established by the SMGW itself to be in control of the communication security. However, using the SMGW as proxy, local devices can neither review the security of these remote connections established by the SMGW nor enforce higher security guarantees than established by the all in one configuration of the SMGW which does not allow for use case-specific security settings. We present mechanisms that enable local devices to regain this insight and control over the full connection, i.e., up to the final receiver, while retaining the SMGW's ability to ensure a suitable security level. Our evaluation shows modest computation and transmission overheads for this increased security in the critical smart grid infrastructure.}, note = {ECSEL; European Union (EU); Horizon 2020; CONNECT Innovative smart components, modules and appliances for a truly connected, efficient and secure smart grid; Grant Agreement No 737434}, tags = {connect}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hiller-aeit-regaining.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2019 AEIT International Annual Conference, September 18-20, 2019, Firenze, Italy}, event_place = {Firenze, Italy}, event_name = {AEIT International Annual Conference}, event_date = {September 18-20, 2019}, ISBN = {978-8-8872-3745-0}, DOI = {10.23919/AEIT.2019.8893406}, reviewed = {1}, author = {Hiller, Jens and Komanns, Karsten and Dahlmanns, Markus and Wehrle, Klaus} } @Inproceedings { 2019-krude-chain-opt, title = {Optimizing Data Plane Programs for the Network}, year = {2019}, month = {8}, day = {23}, abstract = {With the move of Software-defined networking from fixed to programmable data planes, network functions are written with P4 or eBPF for targets such as programmable switches, CPU based flow processors and commodity CPUs. These data plane programs are, however, limited in per-packet time budget (e.g., 67.2 ns at 10GbE) and program size, making program optimization imperative. Existing approaches focus on optimizing the distribution of flow rules in fixed data planes or they are limited to a single switch. We see great potential in integrating the network topology into program optimization.}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-krude-chain-opt.pdf}, publisher = {ACM}, booktitle = {NetPL '19: ACM SIGCOMM Workshop on Networking and Programming Languages}, event_place = {Beijing, China}, ISBN = {978-1-4503-6877-3/19/08}, DOI = {10.1145/3341561.3349590}, reviewed = {1}, author = {Krude, Johannes and Eichholz, Matthias and Winck, Maximilian and Wehrle, Klaus and Mezini, Mira} } @Inproceedings { 2019-hohlfeld-bpfperf, title = {Demystifying the Performance of XDP BPF}, year = {2019}, month = {6}, day = {25}, tags = {maki,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf}, publisher = {IEEE}, booktitle = {IEEE International Conference on Network Softwarization (NetSoft)}, event_name = {IEEE International Conference on Network Softwarization}, DOI = {10.1109/NETSOFT.2019.8806651}, reviewed = {1}, author = {Hohlfeld, Oliver and Krude, Johannes and Reelfs, Jens Helge and R{\"u}th, Jan and Wehrle, Klaus} } @Inproceedings { 2019-rueth-ccfness, title = {An Empirical View on Content Provider Fairness}, year = {2019}, month = {6}, day = {19}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-ccfness.pdf}, web_url2 = {https://arxiv.org/abs/1905.07152}, publisher = {IFIP/IEEE}, booktitle = {In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19)}, event_place = {Paris, France}, event_name = {Network Traffic Measurement and Analysis Conference}, event_date = {19.06.2019 - 21.06.2019}, DOI = {10.23919/TMA.2019.8784684}, reviewed = {1}, author = {R{\"u}th, Jan and Kunze, Ike and Hohlfeld, Oliver} } @Inproceedings { 2019_pennekamp_infrastructure, title = {Towards an Infrastructure Enabling the Internet of Production}, year = {2019}, month = {5}, day = {8}, pages = {31-37}, abstract = {New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.}, keywords = {Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW}, event_place = {Taipei, TW}, event_date = {May 6-9, 2019}, ISBN = {978-1-5386-8500-6/19}, DOI = {10.1109/ICPHYS.2019.8780276}, reviewed = {1}, author = {Pennekamp, Jan and Glebke, Ren{\'e} and Henze, Martin and Meisen, Tobias and Quix, Christoph and Hai, Rihan and Gleim, Lars and Niemietz, Philipp and Rudack, Maximilian and Knape, Simon and Epple, Alexander and Trauth, Daniel and Vroomen, Uwe and Bergs, Thomas and Brecher, Christian and B{\"u}hrig-Polaczek, Andreas and Jarke, Matthias and Wehrle, Klaus} } @Article { rueth:iw:TNSM19, title = {TCP’s Initial Window – Deployment in the Wild and its Impact on Performance}, journal = {IEEE Transactions on Network and Service Management}, year = {2019}, month = {1}, day = {30}, volume = {16}, number = {2}, pages = {389--402}, tags = {maki}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2019.2896335}, reviewed = {1}, author = {R{\"u}th, Jan and Kunze, Ike and Hohlfeld, Oliver} } @Article { 2019_wehrle_dagstuhl_beginners, title = {The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research}, journal = {ACM SIGCOMM Computer Communication Review}, year = {2019}, month = {1}, volume = {49}, number = {1}, pages = {24-30}, abstract = {Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.}, ISSN = {0146-4833}, DOI = {10.1145/3314212.3314217}, author = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus} } @Inproceedings { 2018-krude-circuit, title = {Circuit Switched VM Networks for Zero-Copy IO}, year = {2018}, month = {8}, day = {20}, pages = {1-7}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-krude-xocks.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2018 Afternoon Workshop on Kernel Bypassing Networks (KBNets'18)}, event_place = {Budapest, Hungary}, event_name = {Afternoon Workshop on Kernel Bypassing Networks}, event_date = {20.8.2018}, DOI = {10.1145/3229538.3229539}, reviewed = {1}, author = {Krude, Johannes and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2018-hiller-ic2e-cpplintegration, title = {Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud}, year = {2018}, month = {4}, day = {19}, pages = {241-249}, tags = {ssiclops,iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf}, web_url = {https://ieeexplore.ieee.org/document/8360335}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA}, event_place = {Orlando, Florida, USA}, event_name = {2018 IEEE International Conference on Cloud Engineering (IC2E 2018)}, event_date = {2018-04-19}, ISBN = {978-1-5386-5008-0}, DOI = {10.1109/IC2E.2018.00050}, reviewed = {1}, author = {Hiller, Jens and Kimmerlin, Mael and Plauth, Max and Heikkila, Seppo and Klauck, Stefan and Lindfors, Ville and Eberhardt, Felix and Bursztynowski, Dariusz and Santos, Jesus Llorente and Hohlfeld, Oliver and Wehrle, Klaus} } @Conference { 2017-fink-brainlab-gmds, title = {BrainLab - Ein Framework f{\"u}r mobile neurologische Untersuchungen}, year = {2017}, month = {8}, day = {29}, note = {Best Abstract Award}, web_url = {https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml}, web_url_date = {06.09.19}, publisher = {German Medical Science GMS Publishing House (2017)}, booktitle = {62. Jahrestagung der Deutschen Gesellschaft f{\"u}r Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS).}, event_place = {Oldenburg}, event_name = {GMDS 2017}, event_date = {17-21 September 2017}, DOI = {10.3205/17gmds137}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinski, Thomas and Titgemeyer, Yannic and Ramos, Roann and Kutafina, Ekaterina and Bitsch, J{\'o} Agila and Jonas, Stephan Michael} } @Proceedings { 2017-SymPerfPoster, title = {SymPerf: Predicting Network Function Performance}, year = {2017}, month = {8}, day = {21}, tags = {spp,erc,symbiosys,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf}, publisher = {ACM}, event_place = {Los Angeles, USA}, event_name = {ACM SIGCOMM 2017 Poster}, event_date = {21.8.2017 - 25.8.2017}, language = {en}, ISBN = {978-1-4503-5057-0/17/08}, DOI = {10.1145/3123878.3131977}, reviewed = {1}, author = {Rath, Felix and Krude, Johannes and R{\"u}th, Jan and Schemmel, Daniel and Hohlfeld, Oliver and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Article { 2017-ziegeldorf-bmcmedgenomics-bloom, title = {BLOOM: BLoom filter based Oblivious Outsourced Matchings}, journal = {BMC Medical Genomics}, year = {2017}, month = {7}, day = {26}, volume = {10}, number = {Suppl 2}, pages = {29-42}, abstract = {Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-Bloom and PHE-Bloom, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-Bloom is fully secure in the semi-honest model while PHE-Bloom slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-Bloom is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (\(\sigma\)=8.73 s) with our first approach and a mere 0.07 s (\(\sigma\)=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-Bloom, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-Bloom, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude.}, note = {Proceedings of the 5th iDASH Privacy and Security Workshop 2016}, keywords = {Secure outsourcing; Homomorphic encryption; Bloom filters}, tags = {sscilops; mynedata; rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-bmcmedgenomics-bloom.pdf}, misc2 = {Online}, publisher = {BioMed Central}, event_place = {Chicago, IL, USA}, event_date = {November 11, 2016}, language = {en}, ISSN = {1755-8794}, DOI = {10.1186/s12920-017-0277-y}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Pennekamp, Jan and Hellmanns, David and Schwinger, Felix and Kunze, Ike and Henze, Martin and Hiller, Jens and Matzutt, Roman and Wehrle, Klaus} } @Article { dombrowski-vdi, title = {Funktechnologien f{\"u}r Industrie 4.0}, journal = {VDE Positionspapier}, year = {2017}, month = {6}, day = {1}, publisher = {VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.}, address = {Stresemannallee 15, 60596 Frankfurt am Main, Germany}, author = {Aktas, Ismet and Bentkus, Alexander and Bonanati, Florian and Dekorsy, Armin and Dombrowski, Christian and Doubrava, Michael and Golestani, Ali and Hofmann, Frank and Heidrich, Mike and Hiensch, Stefan and Kays, R{\"u}diger and Meyer, Michael and M{\"u}ller, Andreas and ten Brink, Stephan and Petreska, Neda and Popovic, Milan and Rauchhaupt, Lutz and Saad, Ahmad and Schotten, Hans and W{\"o}ste, Christoph and Wolff, Ingo} } @Inproceedings { 2017-serror-pads-cows, title = {Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping}, year = {2017}, month = {5}, day = {24}, tags = {memosim,symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-pads-cows.pdf}, publisher = {ACM}, howpublished = {online}, booktitle = {Proceedings of the 5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17), Singapore, Singapore}, event_place = {Singapore, Singapore}, event_name = {5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17)}, event_date = {May 24-26, 2017}, ISBN = {978-1-4503-4489-0}, DOI = {10.1145/3064911.3064913}, reviewed = {1}, author = {Serror, Martin and Kirchhof, J{\"o}rg Christian and Stoffers, Mirko and Wehrle, Klaus and Gross, James} } @Conference { 2017-fink-brainlab, title = {BrainLab – towards mobile brain research}, year = {2017}, month = {4}, day = {24}, pages = {2}, url = {/fileadmin/papers/2017/2017-fink-brainlab.pdf}, web_url2 = {http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf}, web_url2_date = {2017-05-09}, misc2 = {Online}, booktitle = {Informatics for Health 2017, Manchester UK}, event_place = {Manchester, UK}, event_name = {Informatics for Health 2017, Manchester UK}, event_date = {24-26 April 2017}, language = {en}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinsky, Thomas and Ramos, Roann and Kutafina, Ekaterina and Bitsch Link, J{\'o} Agila and Jonas, Stephan} } @Inproceedings { 2017-matzutt-mynedata, title = {myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data}, year = {2017}, pages = {1073-1084}, abstract = {Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.}, note = {Presentation slides are in German}, keywords = {Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling}, tags = {mynedata_show}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf}, web_url = {https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf}, web_url_date = {Presentation slides}, editor = {Eibl, Maximilian and Gaedke, Martin}, publisher = {Gesellschaft f{\"u}r Informatik, Bonn}, booktitle = {INFORMATIK 2017}, event_place = {Chemnitz}, event_name = {INFORMATIK 2017}, event_date = {2017-09-28}, language = {English}, ISBN = {978-3-88579-669-5}, ISSN = {1617-5468}, DOI = {10.18420/in2017_109}, reviewed = {1}, author = {Matzutt, Roman and M{\"u}llmann, Dirk and Zeissig, Eva-Maria and Horst, Christiane and Kasugai, Kai and Lidynia, Sean and Wieninger, Simon and Ziegeldorf, Jan Henrik and Gudergan, Gerhard and Spiecker gen. D{\"o}hmann, Indra and Wehrle, Klaus and Ziefle, Martina} } @Inproceedings { 2016-henze-cloudcom-trinics, title = {Towards Transparent Information on Individual Cloud Service Usage}, year = {2016}, month = {12}, day = {12}, pages = {366-370}, tags = {trinics}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg}, language = {en}, ISBN = {978-1-5090-1445-3}, DOI = {10.1109/CloudCom.2016.0064}, reviewed = {1}, author = {Henze, Martin and Kerpen, Daniel and Hiller, Jens and Eggert, Michael and Hellmanns, David and M{\"u}hmer, Erik and Renuli, Oussama and Maier, Henning and St{\"u}ble, Christian and H{\"a}u{\ss}ling, Roger and Wehrle, Klaus} } @Inproceedings { 2016-ahmed-sensys-poster-incremental, title = {Poster Abstract: Incremental Checkpointing for Interruptible Computations}, year = {2016}, month = {11}, day = {14}, pages = {1--2}, abstract = {We propose incremental checkpointing techniques enabling transiently powered devices to retain computational state across multiple activation cycles. As opposed to the existing approaches, which checkpoint complete program state, the proposed techniques keep track of modified RAM locations to incrementally update the retained state in secondary memory, significantly reducing checkpointing overhead both in terms of time and energy.}, url = {/fileadmin/misc/2016/2016-ahmed-sensys-poster-incremental.pdf}, web_url = {http://dl.acm.org/citation.cfm?id=2996701}, web_url_date = {2016-11-20}, web_url2 = {http://sensys.acm.org/2016/}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016), Stanford, CA, USA}, event_place = {Stanford, CA, USA}, event_name = {Sensys '16}, event_date = {November 14-16, 2016}, language = {en}, ISBN = {978-1-4503-4263-6/16/11}, DOI = {http://dx.doi.org/10.1145/2994551.2996701}, reviewed = {1}, author = {Ahmed, Saad and Khan, Hassan and Siddiqui, Junaid Haroon and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad} } @Inproceedings { DombrowskiSRDS16, title = {Model-Checking Assisted Protocol Design for Ultra-reliable Low-Latency Wireless Networks}, year = {2016}, month = {9}, day = {27}, pages = {307--316}, keywords = {fault tolerance;formal verification;protocols;wireless channels;EchoRing protocol;fault-tolerant methods;formal model-based verification;model-checking assisted protocol;probabilistic model checking;reliability constraints;safety-critical industrial applications;salient features;token loss;token-based system;ultrareliable low-latency wireless networks;unprecedented latency;wireless networking community;wireless protocols;wireless token-passing systems;Automata;Model checking;Payloads;Probabilistic logic;Protocols;Reliability;Wireless communication;Model checking;Probabilistic timed automata;Token passing;Wireless Industrial Networks;tool-assisted protocol design;validation}, tags = {cps,hodrian}, web_url = {http://ieeexplore.ieee.org/document/7794360/}, booktitle = {Proc. of IEEE 35th Symposium on Reliable Distributed Systems}, organization = {IEEE}, event_place = {Budapest, Hungary}, event_name = {IEEE 35th Symposium on Reliable Distributed Systems (SRDS)}, DOI = {10.1109/SRDS.2016.048}, reviewed = {1}, author = {Dombrowski, Christian and Junges, Sebastian and Katoen, Joost-Pieter and Gross, James} } @Inproceedings { 2016-ackermann-healthcom-eeg-emotion, title = {EEG-based Automatic Emotion Recognition: Feature Extraction, Selection and Classification Methods}, year = {2016}, month = {9}, day = {14}, pages = {159--164}, abstract = {Automatic emotion recognition is an interdisciplinary research field which deals with the algorithmic detection of human affect, e.g. anger or sadness, from a variety of sources, such as speech or facial gestures. Apart from the obvious usage for industry applications in human-robot interaction, acquiring the emotional state of a person automatically also is of great potential for the health domain, especially in psychology and psychiatry. Here, evaluation of human emotion is often done using oral feedback or questionnaires during doctor-patient sessions. However, this can be perceived as intrusive by the patient. Furthermore, the evaluation can only be done in a non-continuous manner, e.g. once a week during therapy sessions. In contrast, using automatic emotion detection, the affect state of a person can be evaluated in a continuous non-intrusive manner, for example to detect early on-sets of depression. An additional benefit of automatic emotion recognition is the objectivity of such an approach, which is not influenced by the perception of the patient and the doctor. To reach the goal of objectivity, it is important, that the source of the emotion is not easily manipulable, e.g. as in the speech modality. To circumvent this caveat, novel approaches in emotion detection research the potential of using physiological measures, such as galvanic skin sensors or pulse meters. In this paper we outline a way of detecting emotion from brain waves, i.e., EEG data. While EEG allows for a continuous, real-time automatic emotion recognition, it furthermore has the charm of measuring the affect close to the point of emergence: the brain. Using EEG data for emotion detection is nevertheless a challenging task: Which features, EEG channel locations and frequency bands are best suited for is an issue of ongoing research. In this paper we evaluate the use of state of the art feature extraction, feature selection and classification algorithms for EEG emotion classification using data from the de facto standard dataset, DEAP. Moreover, we present results that help choose methods to enhance classification performance while simultaneously reducing computational complexity.}, url = {/fileadmin/papers/2016/2016-ackermann-healthcom-emorec.pdf}, web_url2 = {http://ieeehealthcom2016.com/}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)}, event_place = {Munich, Germany}, event_name = {2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)}, event_date = {September 14-17, 2016}, language = {en}, ISBN = {978-1-5090-3370-6}, reviewed = {1}, author = {Ackermann, Pascal and Kohlschein, Christian and Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Jeschke, Sabina} } @Article { 2016-fgcs-henze-iotprivacy, title = {A Comprehensive Approach to Privacy in the Cloud-based Internet of Things}, journal = {Future Generation Computer Systems}, year = {2016}, month = {3}, volume = {56}, pages = {701-718}, tags = {ipacs}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-fgcs-iotprivacy.pdf}, misc2 = {Online}, publisher = {Elsevier}, language = {en}, ISSN = {0167-739X}, DOI = {10.1016/j.future.2015.09.016}, reviewed = {1}, author = {Henze, Martin and Hermerschmidt, Lars and Kerpen, Daniel and H{\"a}u{\ss}ling, Roger and Rumpe, Bernhard and Wehrle, Klaus} } @Article { 2016-kunz-tomacs-horizon, title = {Parallel Expanded Event Simulation of Tightly Coupled Systems}, journal = {ACM Transactions on Modeling and Computer Simulation (TOMACS)}, year = {2016}, month = {1}, volume = {26}, number = {2}, pages = {12:1--12:26}, abstract = {The technical evolution of wireless communication technology and the need for accurately modeling these increasingly complex systems causes a steady growth in the complexity of simulation models. At the same time, multi-core systems have become the de facto standard hardware platform. Unfortunately, wireless systems pose a particular challenge for parallel execution due to a tight coupling of network entities in space and time. Moreover, model developers are often domain experts with no in-depth understanding of parallel and distributed simulation. In combination, both aspects severely limit the performance and the efficiency of existing parallelization techniques. We address these challenges by presenting parallel expanded event simulation, a novel modeling paradigm that extends discrete events with durations which span a period in simulated time. The resulting expanded events form the basis for a conservative synchronization scheme that considers overlapping expanded events eligible for parallel processing. We furthermore put these concepts into practice by implementing Horizon, a parallel expanded event simulation framework specifically tailored to the characteristics of multi-core systems. Our evaluation shows that Horizon achieves considerable speedups in synthetic as well as real-world simulation models and considerably outperforms the current state-of-the-art in distributed simulation.}, keywords = {Parallel discrete event simulation, Multi-core Systems, Wireless Systems, Simulation Modeling Paradigm, Conservative Synchronization}, tags = {horizon}, publisher = {ACM}, language = {en}, DOI = {10.1145/2832909}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Landsiedel, Olaf and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-ahfe-kowalewski-facebook, title = {Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany}, journal = {Procedia Manufacturing}, year = {2015}, month = {7}, volume = {3}, pages = {815--822}, publisher = {Elsevier}, booktitle = {The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA}, language = {en}, ISSN = {2351-9789}, DOI = {10.1016/j.promfg.2015.07.336}, reviewed = {1}, author = {Kowalewski, Sylvia and Ziefle, Martina and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Incollection { 2013-wtc-eggert-sensorcloud, title = {SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators}, year = {2014}, month = {12}, day = {14}, pages = {203-218}, tags = {sensorcloud}, url = {fileadmin/papers/2013/2013-wtc-eggert-sensorcloud.pdf}, misc2 = {Online}, editor = {Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard}, publisher = {Springer}, booktitle = {Trusted Cloud Computing}, language = {en}, ISBN = {978-3-319-12717-0}, DOI = {10.1007/978-3-319-12718-7_13}, reviewed = {1}, author = {Eggert, Michael and H{\"a}u{\ss}ling, Roger and Henze, Martin and Hermerschmidt, Lars and Hummen, Ren{\'e} and Kerpen, Daniel and Navarro P{\'e}rez, Antonio and Rumpe, Bernhard and Thi{\ss}en, Dirk and Wehrle, Klaus} } @Inproceedings { 2014-mass-wirtz-mafi, title = {High-performance, Energy-efficient Mobile Wireless Networking in 802.11 Infrastructure Mode}, year = {2014}, month = {10}, url = {fileadmin/papers/2014/2014-wirtz-mass-mafi.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, booktitle = {Proceedings of The 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014), Philadelphia, PA, USA}, event_place = {Philadelphia, USA}, event_name = {11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014)}, event_date = {27 - 30 October 2014}, language = {en}, ISBN = {978-1-4799-6035-4}, DOI = {10.1109/MASS.2014.21}, reviewed = {1}, author = {Wirtz, Hanno and Kunz, Georg and Laudenberg, Johannes and Backhaus, Robert and Wehrle, Klaus} } @Inproceedings { 2014-ficloud-henze-upecsi, title = {User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things}, year = {2014}, month = {8}, day = {27}, pages = {191-196}, tags = {ipacs}, url = {/fileadmin/papers/2014/2014-ficloud-henze-upecsi.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014)}, language = {en}, ISBN = {978-1-4799-4357-9}, DOI = {10.1109/FiCloud.2014.38}, reviewed = {1}, author = {Henze, Martin and Hermerschmidt, Lars and Kerpen, Daniel and H{\"a}u{\ss}ling, Roger and Rumpe, Bernhard and Wehrle, Klaus} } @Conference { 2014-hohlfeld-harvester, title = {The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape}, year = {2014}, month = {6}, url = {http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf}, web_url = {http://asiaccs2014.nict.go.jp/}, publisher = {ACM}, booktitle = {9th ACM Symposium on Information, Computer and Communications Security}, DOI = {10.1145/2590296.2590302}, reviewed = {1}, author = {Stringhini, Gianluca and Hohlfeld, Oliver and Kruegel, Christopher and Vigna, Giovanni} } @Inproceedings { 2014-stoffers-simutools-distributed-horizon, title = {Large-Scale Network Simulation: Leveraging the Strengths of Modern SMP-based Compute Clusters}, year = {2014}, month = {3}, day = {17}, pages = {31-40}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-stoffers-simutools-distributed-horizon.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SIMUTools'14), Lisbon, Portugal}, event_place = {Lisbon, Portugal}, language = {en}, ISBN = {978-1-63190-007-5}, DOI = {10.4108/icst.simutools.2014.254622}, reviewed = {1}, author = {Stoffers, Mirko and Schmerling, Sascha and Kunz, Georg and Gross, James and Wehrle, Klaus} } @Article { HohlfeldCCR14, title = {An Internet census taken by an illegal botnet - A qualitative assessment of published measurements}, journal = {ACM SIGCOMM Computer Communication Review}, year = {2014}, volume = {44}, number = {3}, url = {http://www.sigcomm.org/sites/default/files/ccr/papers/2014/July/0000000-0000013.pdf}, web_url = {http://www.sigcomm.org/ccr/papers/2014/July}, author = {Krenc, Thomas and Hohlfeld, Oliver and Feldmann, Anja} } @Inproceedings { 2013-cloudcom-henze-cloud-data-handling, title = {Towards Data Handling Requirements-aware Cloud Computing (Poster Abstract)}, year = {2013}, month = {12}, day = {2}, pages = {266-269}, tags = {ipacs}, url = {fileadmin/papers/2013/2013-cloudcom-henze-cloud-data-handling.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK}, event_place = {Bristol, UK}, event_name = {2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013)}, language = {en}, ISBN = {978-0-7695-5095-4}, DOI = {10.1109/CloudCom.2013.145}, reviewed = {1}, author = {Henze, Martin and Gro{\ss}fengels, Marcel and Koprowski, Maik and Wehrle, Klaus} } @Techreport { 2013-ceriotti-fgsn-appcentric, title = {Towards Application-Centric Deployment of Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {13}, number = {SEEMOO-TR-2013-0}, number2 = {12. GI/ITG KuVS Fachgespr{\"a}ch ''Drahtlose Sensornetze''}, institution = {TU Cottbus}, type = {Technical Report}, author = {Ceriotti, Matteo and Krylovskiy, Alexandr and Wehrle, Klaus} } @Techreport { 2013-draft-garcia-core-security-06, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {9}, day = {11}, number = {draft-garcia-core-security-06}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-06}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2013-sec-routing-switching-maki, title = {A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks}, year = {2013}, month = {6}, day = {4}, booktitle = {Proceedings of the 4th IEEE International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN 2013)}, state = {accepted}, reviewed = {1}, author = {Werner, Marc and Kaiser, J{\"o}rg and Hollick, Matthias and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { 2013-wisec-garcia-securing, title = {Securing the IP-based Internet of Things with HIP and DTLS}, year = {2013}, month = {4}, pages = {119--124}, publisher = {ACM}, booktitle = {Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)}, ISBN = {978-1-4503-1998-0}, DOI = {10.1145/2462096.2462117}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Moreno-Sanchez, Pedro and Vidal-Meca, Francisco and Ziegeldorf, Jan Henrik} } @Inproceedings { 2013-pitsac-vidalmeca-hip, title = {HIP security architecture for the IP-based Internet of Things}, year = {2013}, month = {3}, day = {25}, pages = {1331 - 1336}, abstract = {The IP-based Internet of Things refers to the pervasive interactions of smart objects and people enabling new applications by means of IP protocols. An application scenario is a Smart City in which the city infrastructure, cars, and people exchange information to enable new services. IP protocols, such as IPv6, TCP and HTTP will be further complemented by IPv6 over Low powerWireless Personal Area Networks and Constrained Application Protocol currently in development in IETF. Security and privacy are a must for the IP-based IoTs in order to ensure its acceptance. However, mobility, limited bandwidth, and resource-constrained devices pose new challenges and require for a sound and efficient security architecture. In particular, dynamic association of mobile smart objects and the management of keys in large-scale networks remain an open challenge. In this context, we propose a flexible security architecture based on the Host Identity Protocol and Multimedia Internet KEYing protocols allowing for secure network association and key management. HIP - based on asymmetric-key cryptography - ensures unambiguous thing identification, mobility support, as well as a lightweight and secure method for network association. In our solution, HIP is extended with MIKEY capabilities to provide enhanced key management using polynomials, which allow to generate pairwise keys with any node based on its identity. This combination of protocols and crypto-algorithms ensures both strong security and very good performance as shown by our implementation and presents clear advantages compared with other alternatives.}, keywords = {Internet of Things; Security; Network Access; Key Management}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013}, event_place = {Barcelona, Spain}, event_date = {25.-28.03.2013}, language = {en}, DOI = {10.1109/WAINA.2013.158}, reviewed = {1}, author = {Vidal Meca, Francisco and Ziegeldorf, Jan Henrik and Garcia-Morchon, Oscar and Kumar, Sandeep S. and Keoh, Sye Loong and Moreno-Sanchez, Pedro} } @Techreport { 2013-draft-garcia-core-security-05, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {3}, day = {11}, number = {draft-garcia-core-security-05}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-05}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Article { 2013-wirtz-alizai-tinywifi-jnca, title = {Portable Wireless-Networking Protocol Evaluation}, journal = {Journal of Network and Computer Applications (JNCA)}, year = {2013}, note = {Co-primary authorship Alizai, Wirtz fileadmin/papers/2013/2013-wirtz-alizai-tinywifi-jnca.pdf}, web_url = {http://www.sciencedirect.com/science/article/pii/S108480451300060X}, language = {en}, ISSN = {1084-8045}, DOI = {10.1016/j.jnca.2013.02.022}, reviewed = {1}, author = {Wirtz, Hanno and Alizai, Muhammad Hamad and Kirchen, Bernhard and Wehrle, Klaus} } @Phdthesis { 2013-kunz-phdthesis, title = {Exploiting Multi-core Systems for Parallel Network Simulation}, year = {2013}, school = {RWTH Aachen University}, author = {Kunz, Georg} } @Inproceedings { 2012-IPIN-Peter-Versatile-Maps, title = {Versatile Geo-referenced Maps for Indoor Navigation of Pedestrians}, year = {2012}, month = {11}, day = {13}, pages = {1--4}, url = {fileadmin/papers/2012/2012-bitsch-IPIN-vegemite.pdf}, web_url2 = {http://www.surveying.unsw.edu.au/ipin2012/proceedings/session.php?code=6C\&name=SLAM}, misc2 = {Online}, editor = {Li, Binghao Li and Gallagher, Thomas}, publisher = {School of Surveying and Geospatial Engineering, University of New South Wales, Sydney, Australia}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-0-646-57851-4}, reviewed = {1}, author = {Peter, Michael and Fritsch, Dieter and Sch{\"a}fer, Bernhardt and Kleusberg, Alfred and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2012-wripe-sasnauskas-symnet, title = {Integration Testing of Protocol Implementations using Symbolic Distributed Execution}, year = {2012}, month = {10}, pages = {6 S.}, tags = {kleenet}, url = {fileadmin/papers/2012/2012-09-wripe-sasnauskas-SymNet.pdf}, misc2 = {Print Online}, address = {Piscataway, NJ, USA}, booktitle = {The 2nd International Workshop on Rigorous Protocol Engineering (WRiPE 2012), 30 October - 02 November 2012, Austin, TX, USA}, organization = {IEEE}, event_place = {Austin, TX, USA}, event_name = {The 2nd International Workshop on Rigorous Protocol Engineering (WRiPE 2012)}, event_date = {October 30 - November 02 2012}, language = {en}, ISBN = {978-1-4673-2445-8}, DOI = {10.1109/ICNP.2012.6459940}, reviewed = {1}, author = {Sasnauskas, Raimondas and Kaiser, Philipp and Jukić, Russ Lucas and Wehrle, Klaus} } @Inproceedings { 2012-kunz-pads-gpu, title = {Multi-level Parallelism for Time- and Cost-efficient Parallel Discrete Event Simulation on GPUs}, year = {2012}, month = {7}, day = {20}, pages = {23--32}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-pads-gpu.pdf}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China}, language = {en}, ISBN = {978-0-7695-4714-5}, ISSN = {1087-4097}, DOI = {10.1109/PADS.2012.27}, reviewed = {1}, author = {Kunz, Georg and Schemmel, Daniel and Gross, James and Wehrle, Klaus} } @Techreport { 2012-draft-garcia-core-security, title = {Security Considerations in the IP-based Internet of Things}, year = {2012}, month = {3}, day = {26}, number = {draft-garcia-core-security-04}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Poster { 2012-kunz-omnetpp-sequencechart, title = {Poster Abstract: Extending the OMNeT++ Sequence Chart for Supporting Parallel Simulations in Horizon}, year = {2012}, month = {3}, day = {23}, affiliation = {5th International Workshop on OMNeT++ (OMNeT++'12), Desenzano del Garda, Italy}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-omnetpp-sequencechart.pdf}, misc2 = {Online}, publisher = {ICST}, event_name = {5th International Workshop on OMNeT++ (OMNeT++'12), Desezano del Garda, Italy}, language = {en}, reviewed = {1}, author = {Kunz, Georg and Tenbusch, Simon and Gross, James and Wehrle, Klaus} } @Inproceedings { 2012-kunz-simutools-probabilistic-sync, title = {Know Thy Simulation Model: Analyzing Event Interactions for Probabilistic Synchronization in Parallel Simulations}, year = {2012}, month = {3}, day = {20}, pages = {119-128}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-simutools-prob-synch.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques (SIMUTools'12), Desenzano del Garda, Italy}, event_place = {Desenzano, Italy}, language = {en}, ISBN = {978-1-4503-1510-4}, DOI = {10.4108/icst.simutools.2012.247716}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-03, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {10}, day = {31}, number = {draft-garcia-core-security-03}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Article { 2011-heer-iot-journal, title = {Security Challenges in the IP-based Internet of Things}, journal = {Springer Wireless Personal Communications Journal}, year = {2011}, month = {10}, volume = {61}, number = {3}, pages = {527-542}, abstract = {A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.}, tags = {iotsec}, url = {fileadmin/papers/2011/2011-heer-iot-challenges.pdf}, misc2 = {Online}, publisher = {Springer}, address = {Netherlands}, language = {en}, ISSN = {0929-6212}, DOI = {10.1007/s11277-011-0385-5}, reviewed = {1}, author = {Heer, Tobias and Garcia-Morchon, Oscar and Hummen, Ren{\'e} and Keoh, Sye Loong and Kumar, Sandeep S. and Wehrle, Klaus} } @Inproceedings { 2011-wintech-alizai-tinywifi, title = {TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers}, year = {2011}, month = {9}, pages = {19-27}, tags = {tinywifi}, url = {fileadmin/papers/2011/2010-09-tinywifi-alizai-wintech.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH ), Las Vegas, NV, USA}, event_place = {Las Vegas, NV, USA}, event_name = {The 17th Annual International Conference on Mobile Computing and Networking}, event_date = {September 2011}, language = {en}, ISBN = {978-1-4503-0867-0}, DOI = {10.1145/2030718.2030725}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kirchen, Bernhard and Vaegs, Tobias and Gnawali, Omprakash and Wehrle, Klaus} } @Inproceedings { 2011-kunz-mascots-performance-prediction, title = {Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations}, year = {2011}, month = {7}, day = {25}, pages = {359 - 368}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-performance-prediction-mascots.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'11), Singapore}, event_place = {Singapore}, event_name = {19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems}, event_date = {July 25-17, 2011}, language = {en}, ISBN = {978-1-4577-0468-0}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2011.15}, reviewed = {1}, author = {Kunz, Georg and Tenbusch, Simon and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-02, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {7}, day = {11}, number = {draft-garcia-core-security-02}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-02}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-icdcs-sasnauskas-sde, title = {Scalable Symbolic Execution of Distributed Systems}, year = {2011}, month = {6}, pages = {333-342}, abstract = {Recent advances in symbolic execution have proposed a number of promising solutions to automatically achieve high-coverage and explore non-determinism during testing. This attractive testing technique of unmodified software assists developers with concrete inputs and deterministic schedules to analyze erroneous program paths. Being able to handle complex systems' software, these tools only consider single software instances and not their distributed execution which forms the core of distributed systems. The step to symbolic distributed execution is however steep, posing two core challenges: (1) additional state growth and (2) the state intra-dependencies resulting from communication. In this paper, we present SDE—a novel approach enabling scalable symbolic execution of distributed systems. The key contribution of our work is two-fold. First, we generalize the problem space of SDE and develop an algorithm significantly eliminating redundant states during testing. The key idea is to benefit from the nodes' local communication minimizing the number of states representing the distributed execution. Second, we demonstrate the practical applicability of SDE in testing with three sensornet scenarios running Contiki OS.}, tags = {kleenet}, url = {fileadmin/papers/2011/2011-06-icdcs-sasnauskas-sde.pdf}, misc2 = {Druck}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011), June 2011, Minneapolis, MN, USA}, language = {en}, ISBN = {978-0-7695-4364-2}, ISSN = {1063-6927}, DOI = {10.1109/ICDCS.2011.28}, reviewed = {1}, author = {Sasnauskas, Raimondas and Soria Dustmann, Oscar and Kaminski, Benjamin Lucien and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-iscc-alizai-ble, title = {Efficient Online Estimation of Bursty Wireless Links}, year = {2011}, month = {6}, url = {fileadmin/papers/2011/2011-alizai-iscc-ble.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {16th IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece}, event_place = {Kerkyra, Greece}, language = {en}, ISBN = {978-1-4577-0678-3}, DOI = {10.1109/ISCC.2011.5983839}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kunz, Georg and Grap, Benjamin and Wehrle, Klaus} } @Article { 22011-itag-samad-cadplus, title = {CAD+: Detecting Colluding Nodes in Gray Hole Attacks}, journal = {Lecture Notes in Informatics GI-Edition}, year = {2011}, month = {3}, day = {25}, volume = {S-10}, number = {Informatiktage 2011}, pages = {279-282}, misc2 = {Druck}, publisher = {K{\"o}llen Verlag GmbH}, address = {Bonn, Germany}, series = {Gesellschaft f{\"u}r Informatik (GI) S-10}, language = {en}, ISBN = {978-3-88579- 444-8}, ISSN = {1614-3213}, author = {Karuppayah, Shankar and Samad, Fahad} } @Inproceedings { OttHLVK2011, title = {Floating Content: Information Sharing in Urban Areas}, year = {2011}, month = {3}, day = {21}, abstract = {Content sharing using personal web pages, blogs, or online social networks is a common means for people to maintain contact with their friends, colleagues, and acquaintances. While such means are essential to overcome distances, using infrastructure services for location-based services may not be desirable. In this paper, we analyze a fully distributed variant of an ephemeral content sharing service, solely dependent on the mobile devices in the vicinity using principles of opportunistic networking. The net result is a best effort service for floating content in which: 1) information dissemination is geographically limited; 2) the lifetime and spreading of information depends on interested nodes being available; 3) content can only be created and distributed locally; and 4) content can only be added, but not explicitly deleted. First we present our system design and summarize its analytical modeling. Then we perform extensive evaluation for a map-based mobility model in downtown Helsinki to assess the operational range for floating content, which, at the same time also validate the analytical results obtained for a more abstract model of the system.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-percom-vaegs-floatingcontent.pdf}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, WA, USA}, event_place = {Seattle, USA}, event_name = {9th IEEE International Conference on Pervasive Computing and Communications}, event_date = {March 21 - 25, 2011}, language = {en}, ISBN = {978-1-4244-9529-0}, reviewed = {1}, author = {Ott, J{\"o}rg and Hyyti{\"a}, Esa and Lassila, Pasi and Vaegs, Tobias and Kangasharju, Jussi} } @Inproceedings { 2011-kunz-omnetpp-horizon, title = {Runtime Efficient Event Scheduling in Multi-threaded Network Simulation}, year = {2011}, month = {3}, day = {21}, pages = {359-366}, abstract = {Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation. We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \textbackslashemph\{push-based event handling scheme\} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \textbackslashemph\{event scheduling algorithm\} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {4th International Workshop on OMNeT++ (OMNeT++'11)}, event_date = {March 21, 2011}, language = {en}, ISBN = {978-1-936968-00-8}, DOI = {10.4108/icst.simutools.2011.245504}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-01, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {14}, number = {draft-garcia-core-security-01}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Techreport { 2011-draft-garcia-core-security-00, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {7}, number = {draft-garcia-core-security-00}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Techreport { 2011-heer-draft-middle-auth, title = {End-Host Authentication for HIP Middleboxes (Version 4)}, year = {2011}, number = {draft-heer-hip-middle-auth-04}, abstract = {The Host Identity Protocol [RFC5201] is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension allows middleboxes to verify the liveness and freshness of a HIP association and, thus, to secure access control in middleboxes.}, note = {Work in progress}, tags = {ietf, mobile_access}, url = {http://tools.ietf.org/html/draft-heer-hip-middle-auth-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Heer, Tobias and Komu, Miika and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2010-krebs-Globecom10-clustering-mesh-conference, title = {Topology Stability-Based Clustering for Wireless Mesh Networks}, year = {2010}, month = {12}, volume = {1}, pages = {1-5}, abstract = {In the past, many clustering algorithms for ad-hoc networks have been proposed. Their main objective is to solve the scalability issue of ad-hoc networks by grouping nodes into clusters. The challenge in MANETs for those clustering algorithms is to cope with the high node mobility which affects the stability of the cluster structures. Wireless mesh networks consist of a static backbone and a number of mobile nodes. In the backbone of a wireless mesh network the topology is relatively static. However, topology changes occur due to frequent link losses and temporary link instability. Due to the static nature of the backbone, mobility-based approaches are not suitable in this case. In this paper, we state the important aspects for stable clustering in wireless mesh networks with unidirectional links based on the investigation of a 45-node wireless mesh testbed. We analyze well-known clustering algorithms and their performance in a large-scale testbed. Finally, we propose a new clustering algorithm called Stable Link Clustering Algorithm (SLCA).}, url = {fileadmin/papers/2010/2010-lora-clustering-MESH.pdf}, web_url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5683417}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, USA}, event_place = {Miami, FL, USA}, event_name = {IEEE Global Telecommunications Conference, GLOBECOM 2010}, event_date = {6 - 10 December 2010}, language = {en}, ISBN = {978-1-4244-5636-9}, DOI = {10.1109/GLOCOM.2010.5683417}, reviewed = {1}, author = {Krebs, Martin and Stein, Andr{\'e} and Lora Gir{\'o}n, M{\'o}nica Alejandra} } @Inproceedings { 2010-sensys-alizai-tinywifi, title = {Poster Abstract: TinyOS Meets Wireless Mesh Networks}, year = {2010}, month = {11}, pages = {429-430}, abstract = {We present TinyWifi, a nesC code base extending TinyOS to support Linux powered network nodes. It enables developers to build arbitrary TinyOS applications and protocols and execute them directly on Linux by compiling for the new TinyWifi platform. Using TinyWifi as a TinyOS platform, we expand the applicability and means of evaluation of wireless protocols originally designed for sensornets towards inherently similar Linux driven ad hoc and mesh networks.}, affiliation = {Received Best Poster Award}, url = {fileadmin/papers/2010/2010-11-alizai-tinywifi-sensys.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1870058\&preflayout=flat}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4503-0344-6}, DOI = {10.1145/1869983.1870058}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kirchen, Bernhard and Bitsch Link, J{\'o} Agila and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 5646775, title = {{Indoor Navigation Approach Based on Approximate Positions}}, year = {2010}, month = {9}, pages = {778--784}, misc2 = {Print}, editor = {Mautz, R., Kunz, M. and Ingensand, H.}, publisher = {IEEE}, booktitle = {Proceedings of the 2010 International Conference on Indoor Positioning and Indoor Navigation (IPIN 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4244-5864-6}, DOI = {10.1109/IPIN.2010.5646775}, author = {Chowaw-Liebman, Ory and Christoph, Uta and Krempels, Karl-Heinz and Terwelp, Christoph} } @Inproceedings { 2010-kunz-mascots-horizon, title = {Expanding the Event Horizon in Parallelized Network Simulations}, year = {2010}, month = {8}, day = {18}, pages = {172-181}, abstract = {The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.}, tags = {horizon}, url = {fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA}, event_place = {Miami, FL, USA}, event_name = {18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)}, event_date = {August 17-19, 2010}, language = {en}, ISBN = {978-0-7695-4197-6}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2010.26}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Gross, James and G{\"o}tz, Stefan and Naghibi, Farshad and Wehrle, Klaus} } @Inproceedings { DBLP:conf/winsys/Chowaw-LiebmanCKT10, title = {Evaluation of an Indoor Navigation Approach based on Approximate Positions}, year = {2010}, month = {7}, pages = {195-201}, misc2 = {Print}, editor = {Rafael F. S. Caldeirinha and Mohammad S. Obaidat}, publisher = {SciTePress}, booktitle = {WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, language = {en}, ISBN = {978-989-8425-24-9}, author = {Chowaw-Liebman, Ory and Christoph, Uta and Krempels, Karl-Heinz and Terwelp, Christoph} } @Inproceedings { DBLP:conf/winsys/ChristophKST10a, title = {Automatic Context Detection of a Mobile user}, year = {2010}, month = {7}, pages = {189-194}, misc2 = {Print}, editor = {Rafael F. S. Caldeirinha and Mohammad S. Obaidat}, publisher = {SciTePress}, booktitle = {WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, language = {en}, ISBN = {978-989-8425-24-9}, author = {Christoph, Uta and Krempels, Karl-Heinz and von St{\"u}lpnagel, Janno and Terwelp, Christoph} } @Inproceedings { icc2010vpsim, title = {Towards Network Centric Development of Embedded Systems}, year = {2010}, month = {5}, day = {23}, pages = {1-6}, abstract = {Nowadays, the development of embedded system hardware and related system software is mostly carried out using virtual platform environments. The high level of modeling detail (hardware elements are partially modeled in a cycle-accurate fashion) is required for many core design tasks. At the same time, the high computational complexity of virtual platforms caused by the detailed level of simulation hinders their application for modeling large networks of embedded systems. In this paper, we propose the integration of virtual platforms with network simulations, combining the accuracy of virtual platforms with the versatility and scalability of network simulation tools. Forming such a hybrid toolchain facilitates the detailed analysis of embedded network systems and related important design aspects, such as resource effectiveness, prior to their actual deployment.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-schuermans-weingaertner-network_centric.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23-27}, language = {en}, ISBN = {978-1-4244-6402-9}, ISSN = {1550-3607}, DOI = {10.1109/ICC.2010.5502185}, reviewed = {1}, author = {Sch{\"u}rmanns, Stefan and Weingaertner, Elias and Kempf, Torsten and Ascheid, Gerd and Wehrle, Klaus and Leupers, Rainer} } @Inproceedings { 2010-ipsn-sasnauskas-kleenet, title = {KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment}, year = {2010}, month = {4}, day = {12}, pages = {186--196}, abstract = {Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.}, keywords = {automated protocol testing, experimentation, failure detection, wireless sensor networks}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791235}, reviewed = {1}, author = {Sasnauskas, Raimondas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inbook { 2010-aktas-modeling-application-traffic-bookchapter, title = {Modeling Application Traffic}, year = {2010}, month = {4}, pages = {397-426}, publisher = {Springer}, chapter = {18}, booktitle = {Modeling and Tools for Network Simulation}, ISBN = {978-3-642-12330-6}, author = {Aktas, Ismet and Mengi, Cem and King, Thomas} } @Incollection { 2010-kunz-simtools-parallelDES, title = {Parallel Discrete Event Simulation}, year = {2010}, month = {4}, pages = {121-131}, misc2 = {Print}, editor = {Klaus Wehrle and Mesut G{\"u}nes and James Gross}, publisher = {Springer}, address = {Berlin, Germany}, chapter = {8}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Kunz, Georg} } @Incollection { 2010-kunz-simtools-deployments, title = {From Simulations to Deployments}, year = {2010}, month = {4}, pages = {83-97}, misc2 = {Print}, editor = {Klaus Wehrle and Mesut G{\"u}nes and James Gross}, publisher = {Springer}, address = {Berlin, Germany}, chapter = {6}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Wittenburg, Georg} } @Inproceedings { DBLP:conf/webist/ChristophGK10, title = {Efficient Literature Research based on Semantic Tagnets - Implemented and Evaluated for a German Text-corpus}, year = {2010}, month = {4}, volume = {2}, pages = {48-54}, misc2 = {Print}, editor = {Joaquim Filipe and Jos{\'e} Cordeiro}, publisher = {INSTICC Press}, booktitle = {WEBIST 2010, Proceedings of the 6th International Conference on Web Information Systems and Technologies, Valencia, Spain}, language = {en}, ISBN = {978-989-674-025-2}, author = {Christoph, Uta and G{\"o}tten, Daniel and Krempels, Karl-Heinz} } @Inbook { 2010-02-book-alizai-hardware-and-systems, title = {Tools and Modeling Approaches for Simulating Hardware and Systems}, year = {2010}, month = {2}, volume = {1}, pages = {99-117}, url = {http://www.network-simulation.info/}, web_url = {http://www.amazon.com/Modeling-Tools-Network-Simulation-Wehrle/dp/3642123309}, misc2 = {Print}, publisher = {Springer LNCS}, chapter = {Chapter 7}, booktitle = {Modeling and Tools for Network Simulation}, language = {EN}, ISBN = {978-3-642-12330-6}, author = {Alizai, Muhammad Hamad and Gao, Lei and Kempf, Torsten and Landsiedel, Olaf} } @Inproceedings { 2010-ARCS-alizai-promotingpower, title = {Promoting Power to a First Class Metric in Network Simulations}, year = {2010}, pages = {387-392}, abstract = {Accurate prediction of energy consumption early in the design process is essential to efficiently optimize algorithms and protocols. However, despite energy efficiency gathering significant attention in networking research, limited effort has been invested in providing requisite evaluation tools and models. Hence, developers demand powerful evaluation tools to assist them in comparing new communication paradigms in terms of energy efficiency, and minimizing the energy requirements of algorithms. In this paper, we argue for promoting energy to a first class metric in network simulations. We explore the challenges involved in modelling energy in network simulations and present a detailed analysis of different modelling techniques. Finally, we discuss their applicability in high-level network simulations.}, url = {fileadmin/papers/2010/2010-2-ARCS-alizai-promoting-power.pdf}, misc2 = {Print}, publisher = {VDE-VERLAG}, address = {Berlin, Germany}, booktitle = {Proceedings of the Workshop on Energy Aware Systems and Methods, in conjunction with GI/ITG ARCS 2010 Hannover, Feb. 21-23}, language = {en}, ISBN = {978-3-8007-3222-7}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kunz, Georg and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 201006GarciaIFIPTM, title = {On Applications of Cooperative Security in Distributed Networks}, year = {2010}, abstract = {ManyapplicationsrunningontheInternetoperateinfullyor semi-distributed fashion including P2P networks or social networks. Dis- tributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability. In particular, faulty or mis- behaving nodes cannot collude to subvert the system operation. This paper addresses the above threats by applying cooperative security techniques to relevant distributed systems in the Internet. Our goal is to present methods that allow the peers to bootstrap basic trust relation- ships at the time of joining a distributed network and remove the peers if trust is lost. We consider the specific security caveats of the analyzed sys- tems, investigate the applicability of existing cooperative security-based protocols, and propose general design guidelines for cooperative-security protocol in described distributed systems.}, misc2 = {Print}, publisher = {Springer}, address = {Berlin}, booktitle = {Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management}, event_place = {Morioka, Japan}, event_name = {4th International Conference on Trust Management}, language = {en}, ISBN = {978-3-642-13445-6}, reviewed = {1}, author = {Kuptsov, Dmitriy and Garcia-Morchon, Oscar and Wehrle, Klaus and Gurtov, Andrei} } @Inproceedings { 2009-kunz-mascots-horizon, title = {Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation}, year = {2009}, month = {9}, day = {21}, pages = {575-577}, abstract = {This paper presents Horizon, an extension to network simulation that enables the efficient and detailed simulation of wireless networks. Our contributions are two-fold as Horizon provides i) an API for accurately modeling processing time of discrete event simulation models by augmenting events with time spans and ii) a lightweight parallelization scheme that utilizes timing information to guide the parallel execution of simulations on multi-core computers. In this paper we primarily focus on the latter.}, tags = {horizon}, url = {fileadmin/papers/2009/2009-kunz-mascots-horizon.pdf}, misc = {Poster}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), London, UK}, event_place = {London, Great Britain}, event_name = {17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09)}, event_date = {September 21-32, 2009}, language = {en}, ISBN = {978-1-4244-4926-2}, ISSN = {1526-7539}, DOI = {10.1109/MASCOT.2009.5366710}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 2009-landsiedel-visa-vipe, title = {A Virtual Platform for Network Experimentation}, year = {2009}, month = {8}, day = {17}, pages = {45--52}, abstract = {Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive. In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.}, keywords = {deployment, network experimentation, resource virtualization, simulation}, url = {fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf}, misc2 = {Print}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures}, event_date = {August 17, 2009}, language = {en}, ISBN = {978-1-60558-595-6}, DOI = {10.1145/1592648.1592657}, reviewed = {1}, author = {Landsiedel, Olaf and Kunz, Georg and G{\"o}tz, Stefan and Wehrle, Klaus} } @Poster { 2009-kunz-nsdi-profab, title = {Poster Abstract: Protocol Factory: Reuse for Network Experimentation}, year = {2009}, month = {4}, day = {22}, url = {fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf}, misc = {Poster}, misc2 = {Online}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, booktitle = {6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)}, language = {en}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { DBLP:conf/icaart/ChristophKW09, title = {JamochaAgent - A Rule-based Programmable Agent}, year = {2009}, month = {1}, pages = {447-454}, misc2 = {Print}, editor = {Joaquim Filipe and Ana L. N. Fred and Bernadette Sharp}, publisher = {INSTICC Press}, booktitle = {ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal}, language = {en}, ISBN = {978-989-8111-66-1}, author = {Christoph, Uta and Krempels, Karl-Heinz and Wilden, Alexander} } @Inproceedings { 2009-icc-heer-middleboxes, title = {End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace}, year = {2009}, volume = {1}, pages = {791-796}, abstract = {Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf}, misc2 = {Print}, publisher = {Piscataway, NJ, USA}, address = {Dresden, Germany}, booktitle = {Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany}, organization = {IEEE}, event_place = {Dresden, Germany}, event_name = {IEEE International Conference on Communications 2009 (ICC 2009)}, language = {en}, ISBN = {978-1-4244-3435-0}, ISSN = {1938-1883}, DOI = {10.1109/ICC.2009.5198984}, reviewed = {1}, author = {Heer, Tobias and Hummen, Ren{\'e} and Komu, Miika and G{\"o}tz, Stefan and Wehrle, Klaus} } @Techreport { 2009-heer-draft-midauth, title = {End-Host Authentication for HIP Middleboxes (Version 2)}, year = {2009}, number = {draft-heer-hip-midauth-02}, abstract = {The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias and Komu, Miika and Wehrle, Klaus} } @Inproceedings { 2008-becher-hotemnets-linkestimation, title = {Towards Short-Term Wireless Link Quality Estimation}, year = {2008}, month = {6}, day = {3}, pages = {1--5}, abstract = {Commonly, routing in sensor networks is limited to longterm stable links. Unstable links, although often promising to be of large routing progress, are not considered for packet forwarding as link estimators typically cannot handle their dynamics. In this paper we introduce short-term link estimation to capture link dynamics at a high resolution in time and to identify when these render a link temporarily reliable or unreliable. We identify such dynamics based on packet overhearing, predict short-term availability and unavailability, and adapt neighbor tables, thereby enlarging the set of links useable by any routing algorithm. Additionally, we show that short-term link estimation integrates seamlessly into today's sensor network link estimators and routing protocols.}, tags = {wld}, url = {fileadmin/papers/2008/2008-becher-hotemnets-linkestimation.pdf}, misc2 = {Online}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Charlottesville, VA, USA}, event_place = {Chalottesville, USA}, event_name = {Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08)}, event_date = {June 2-3, 2008}, language = {en}, ISBN = {978-1-60558-209-2}, reviewed = {1}, author = {Becher, Alexander and Landsiedel, Olaf and Kunz, Georg and Wehrle, Klaus} } @Inbook { 2008-thissen-LNCS-multimedia, title = {Multimedia and VR Support for Direct Communication of Designers}, year = {2008}, pages = {268-299}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Sch{\"u}ppen, Andr{\'e} and Spaniol, Otto and Thi{\ss}en, Dirk and Assenmacher, Ingo and Haberstroh, Edmund and Kuhlen, Thorsten} } @Techreport { 2008-heer-draft-midauth, title = {End-Host Authentication for HIP Middleboxes (Version 1)}, year = {2008}, number = {draft-heer-hip-midauth-01}, abstract = {The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias and Komu, Miika and Wehrle, Klaus} } @Inproceedings { 200707WeingaertnerEuroView2007HVSNNGN, title = {Hybrid Sensor-Vehicular Networks in the context of next-generation networks}, year = {2007}, month = {7}, day = {23}, volume = {1}, pages = {1}, abstract = {Both Wireless Sensor Networks (WSNs) and Vehicular Ad-Hoc Networks (VANETs) are technologies that gained extensive attention in the research community during the last years, and many people agree that those are about to contribute to the networks of tomorrow in a signi cant way. Within the talk, we present our work on the novel paradigm of Hybrid Sensor-Vehicular Networks (HSVNs) and their contribution to next-generation network architectures. The idea behind Hybrid Sensor-Vehicular Networks is to deploy sensor nodes within the road environment. For example, it is imaginable that future roads will be equipped with sensor nodes that are able to sense environmental events, such as ice, aquaplaning or structural damages. Those events are gathered locally using a wireless sensor network and are delivered directly to vehicles that pass by. Afterwards, information is spread in a wider area using the VANET.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2007/2007-eurongi-hybrid-wsn-weingaertner-kargl.pdf}, web_url = {http://www3.informatik.uni-wuerzburg.de/euroview/2007/program.shtml}, misc2 = {online}, publisher = {EuroNGI}, howpublished = {online}, booktitle = {Proceedings of 7th W{\"u}rzburg Workshop on IP ''Visions of Future Generation Networks'' (EuroView2007)}, event_place = {W{\"u}rzburg, Germany}, event_name = {7th W{\"u}rzburg Workshop on IP ''Visions of Future Generation Networks'' (EuroView2007)}, event_date = {23.7.2007 / 24.7.2007}, language = {en}, ISBN = {none}, ISSN = {none}, reviewed = {1}, author = {Weingaertner, Elias and Kargl, Frank} } @Article { ChrKre07PiK, title = {Automatisierte Integration von Informationsdiensten}, journal = {Praxis der Informationsverarbeitung und Kommunikation (PIK)}, year = {2007}, volume = {30}, number = {2}, pages = {112--120}, misc2 = {Print}, publisher = {De Gruyter Saur}, language = {de}, ISSN = {0930-5157}, DOI = {10.1515/PIKO.2007.112}, author = {Christoph, Uta and Krempels, Karl-Heinz} } @Techreport { 200706WeingaertnerFGSN07HSVNPrototype, title = {A prototype study on Hybrid Sensor-Vehicular Networks}, journal = {Proceedings of the 2007 GI Special Interest Meeting (''Fachgespraech'') on Wireless Sensor Networks}, year = {2007}, pages = {1-4}, note = {Proceedings published as technical report at RWTH Aachen.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2007/2007-weingaertner-kargl-fgsn.pdf}, editor = {Klaus Wehrle}, publisher = {RWTH Aachen University}, address = {Bonn, Germany}, institution = {RWTH Aachen}, event_place = {Aachen, Germany}, event_name = {Fachgespraech Sensornetzwerke}, event_date = {16.7.2007 / 17.7.2007}, type = {A prototype study on Hybrid Sensor-Vehicular Networks}, ISSN = {0935-3232}, reviewed = {1}, author = {Weingaertner, Elias and Kargl, Frank} } @Inproceedings { 200504mongerinformatiktage, title = {Eine strategieorientierte, modulare Simulationsumgebung f{\"u}r mobile Ad-Hoc-Szenarien}, year = {2005}, address = {Schloss Birlinghoven}, booktitle = {Proceedings of GI-Informatiktage 2005}, author = {Monger, Andreas and Hofmann, Stefanie and Bronni, Jan and Kronfeld, Marcel} } @Techreport { 200605OCALATechReportUCB, title = {OCALA: An Architecture for Supporting Legacy Applications over Overlays}, year = {2005}, number = {UCB/CSD-005/1397}, abstract = {The ever increasing demand of new applications coupled with the increasing rigidity of the Internet has led researchers to propose overlay networks as a means of introducing new functionality in the Internet. However, despite sustained efforts, few overlays are used widely. Providing support for legacy Internet applications to access such overlays would significantly expand the user base of the overlays, as the users can instantly benefit from the overlay functionality. We present the design and implementation of OCALA, an Overlay Convergence Architecture for Legacy Applications. Unlike previous efforts, OCALA allows users to access different overlays simultaneously, as well as hosts in different overlays to communicate with each other. In addition, OCALA reduces the implementation burden on the overlay developers, by factoring out the functions commonly required to support legacy applications, such as tapping legacy traffic, authentication and encryption. Our implementation of OCALA as a proxy requires no changes to the applications or operating systems. We currently support two overlays, i3 and RON, on Linux and Windows XP/2000 platforms. We (and a few other research groups and end-users) have used the proxy over a eleven-month period with many legacy applications ranging from web browsers to remote desktop applications.}, url = {http://ocala.cs.berkeley.edu}, address = {UCB, Berkeley, USA}, institution = {University of California at Berkeley}, author = {Joseph, Dilip and Kannan, Jayanthkumar and Kubota, Ayumu and Stoica, Ion and Wehrle, Klaus} } @Techreport { 200606i3proxytechreport, title = {Supporting Legacy Applications over i3}, year = {2004}, number = {UCB/CSD-04-1342}, abstract = {Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique which allows the proxy to tunnel the legacy traffic over the overlay transparently. Our solution can preserve IP packet headers on an end-to-end basis, even when end-host IP addresses change, or when endhosts live in different address spaces (e.g., behind NATs). In addition, our solution allows the use of human-readable names to refer to hosts or services, and requires no changes to applications or operating systems. To illustrate how the proxy enables legacy applications to take advantage of the overlay (i.e., i3) functionality, we present four examples: enabling access to machines behind NAT boxes, secure Intranet access, routing legacy traffic through Bro, an intrusion detection system, and anonymous web download. We have implemented the proxy on Linux andWindows XP/2000 platforms, and used it over the i3 service on PlanetLab over a three month period with a variety of legacy applications ranging from web browsers to operating system-specific file sharing.}, url = {http://i3.cs.berkeley.edu}, address = {UCB, Berkeley, USA}, institution = {University of California at Berkeley}, type = {Technical Report}, author = {Kannan, Jayanthkumar and Kubota, Ayumu and Lakshminarayanan, Karthik and Stoica, Ion and Wehrle, Klaus} }