This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2023-06-08
Creation time: 17-43-38
--- Number of references
95
inproceedings
2023_bodenbenner_fairsensor
FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization
2023
7
The long-term utility and reusability of measurement data from production processes depend on the appropriate contextualization of the measured values. These requirements further mandate that modifications to the context need to be recorded. To be (re-)used at all, the data must be easily findable in the first place, which requires arbitrary filtering and searching routines. Following the FAIR guiding principles, fostering findable, accessible, interoperable and reusable (FAIR) data, in this paper, the FAIR Sensor Ecosystem is proposed, which provides a contextualization middleware based on a unified data metamodel. All information and relations which might change over time are versioned and associated with temporal validity intervals to enable full reconstruction of a system's state at any point in time. A technical validation demonstrates the correctness of the FAIR Sensor Ecosystem, including its contextualization model and filtering techniques. State-of-the-art FAIRness assessment frameworks rate the proposed FAIR Sensor Ecosystem with an average FAIRness of 71%. The obtained rating can be considered remarkable, as deductions mainly result from the lack of fully appropriate FAIRness metrics and the absence of relevant community standards for the domain of the manufacturing industry.
FAIR Data; Cyber-Physical Systems; Data Management; Data Contextualization; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bodenbenner-fair-ecosystem.pdf
IEEE
Proceedings of the 21th IEEE International Conference on Industrial Informatics (INDIN '23), July 17-20, 2023, Lemgo, Germany
Lemgo, Germany
July 17-20, 2023
accepted
1
MatthiasBodenbenner
JanPennekamp
BenjaminMontavon
KlausWehrle
Robert H.Schmitt
incollection
2023_rueppel_crd-b2.ii
Model-Based Controlling Approaches for Manufacturing Processes
2023
2
8
The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).
Process control; Model-based control; Data aggregation; Model identification; Model optimization
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf
Springer
Internet of Production: Fundamentals, Applications and Proceedings
978-3-030-98062-7
10.1007/978-3-030-98062-7_7-1
1
Adrian KarlRüppel
MuzafferAy
BenediktBiernat
IkeKunze
MarkusLandwehr
SamuelMann
JanPennekamp
PascalRabe
Mark P.Sanders
DominikScheurenberg
SvenSchiller
TiandongXi
DirkAbel
ThomasBergs
ChristianBrecher
UweReisgen
Robert H.Schmitt
KlausWehrle
incollection
2023_pennekamp_crd-a.i
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
2023
2
8
The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf
Springer
Internet of Production: Fundamentals, Applications and Proceedings
978-3-030-98062-7
10.1007/978-3-030-98062-7_2-1
1
JanPennekamp
AnastasiiaBelova
ThomasBergs
MatthiasBodenbenner
AndreasBührig-Polaczek
MarkusDahlmanns
IkeKunze
MoritzKröger
SandraGeisler
MartinHenze
DanielLütticke
BenjaminMontavon
PhilippNiemietz
LuciaOrtjohann
MaximilianRudack
Robert H.Schmitt
UweVroomen
KlausWehrle
MichaelZeng
incollection
2023_klugewilkes_crd-b2.iv
Modular Control and Services to Operate Line-less Mobile Assembly Systems
2023
2
8
The increasing product variability and lack of skilled workers demand for autonomous, flexible production. Since assembly is considered a main cost driver and accounts for a major part of production time, research focuses on new technologies in assembly. The paradigm of Line-less Mobile Assembly Systems (LMAS) provides a solution for the future of assembly by mobilizing all resources. Thus, dynamic product routes through spatiotemporally configured assembly stations on a shop floor free of fixed obstacles are enabled. In this chapter, we present research focal points on different levels of LMAS, starting with the macroscopic level of formation planning, followed by the mesoscopic level of mobile robot control and multipurpose input devices and the microscopic level of services, such as interpreting autonomous decisions and in-network computing. We provide cross-level data and knowledge transfer through a novel ontology-based knowledge management. Overall, our work contributes to future safe and predictable human-robot collaboration in dynamic LMAS stations based on accurate online formation and motion planning of mobile robots, novel human-machine interfaces and networking technologies, as well as trustworthy AI-based decisions.
Lineless mobile assembly systems (LMAS); Formation planning; Online motion planning; In-network computing; Interpretable AI; Human-machine collaboration; Ontology-based knowledge management
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-klugewilkes-iop-b2.iv.pdf
Springer
Internet of Production: Fundamentals, Applications and Proceedings
978-3-030-98062-7
10.1007/978-3-030-98062-7_13-1
1
AlineKluge-Wilkes
RalphBaier
DanielGossen
IkeKunze
AleksandraMüller
AmirShahidi
DominikWolfschläger
ChristianBrecher
BurkhardCorves
MathiasHüsing
VerenaNitsch
Robert H.Schmitt
KlausWehrle
inproceedings
2022-rechenberg-cim
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
2022
10
Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf
https://zenodo.org/record/7148794
Zenodo
European Workshop on Maritime Systems Resilience and Security (MARESEC 2022)
Bremerhaven, Germany
10.5281/zenodo.7148794
1
Merlinvon Rechenberg
NinaRößler
MariSchmidt
KonradWolsing
FlorianMotz
MichaelBergmann
ElmarPadilla
JanBauer
inproceedings
2022_lohmoeller_sovereignty
On the Need for Strong Sovereignty in Data Ecosystems
2022
9
5
3306
51-63
Data ecosystems are the foundation of emerging data-driven business models as they (i) enable an automated exchange between their participants and (ii) provide them with access to huge and heterogeneous data sources. However, the corresponding benefits come with unforeseen risks as also sensitive information is potentially exposed. Consequently, data security is of utmost importance and, thus, a central requirement for the successful implementation of these ecosystems. Current initiatives, such as IDS and GAIA-X, hence foster sovereign participation via a federated infrastructure where participants retain local control. However, these designs place significant trust in remote infrastructure by mostly implementing organizational security measures such as certification processes prior to admission of a participant. At the same time, due to the sensitive nature of involved data, participants are incentivized to bypass security measures to maximize their own benefit: In practice, this issue significantly weakens sovereignty guarantees. In this paper, we hence claim that data ecosystems must be extended with technical means to reestablish such guarantees. To underpin our position, we analyze promising building blocks and identify three core research directions toward stronger data sovereignty, namely trusted remote policy enforcement, verifiable data tracking, and integration of resource-constrained participants. We conclude that these directions are critical to securely implement data ecosystems in data-sensitive contexts.
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-lohmoeller-deco.pdf
CEUR Workshop Proceedings
Proceedings of the 1st International Workshop on Data Ecosystems (DEco '22), co-located with the 48th International Conference on Very Large Databases (VLDB '22), September 5-9, 2022, Sydney, Australia,
Sydney, Australia
International Workshop on Data Ecosystems (DEco '22)
September 5, 2022
1613-0073
1
JohannesLohmöller
JanPennekamp
RomanMatzutt
KlausWehrle
article
2022-henze-tii-prada
Complying with Data Handling Requirements in Cloud Storage Systems
IEEE Transactions on Cloud Computing
2022
9
10
3
1661-1674
In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and privacy concerns, complying with data handling requirements becomes a crucial property for cloud storage systems. We present Prada , a practical approach to account for compliance with data handling requirements in key-value based cloud storage systems. To achieve this goal, Prada introduces a transparent data handling layer, which empowers clients to request specific data handling requirements and enables operators of cloud storage systems to comply with them. We implement Prada on top of the distributed database Cassandra and show in our evaluation that complying with data handling requirements in cloud storage systems is practical in real-world cloud deployments as used for microblogging, data sharing in the Internet of Things, and distributed email storage.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-henze-tii-prada.pdf
Online
en
2168-7161
10.1109/TCC.2020.3000336
1
MartinHenze
RomanMatzutt
JensHiller
ErikMühmer
Jan HenrikZiegeldorf
Johannesvan der Giet
KlausWehrle
inproceedings
2022_wagner_ccchain
Scalable and Privacy-Focused Company-Centric Supply Chain Management
2022
5
4
Blockchain technology promises to overcome trust and privacy concerns inherent to centralized information sharing. However, current decentralized supply chain management systems do either not meet privacy and scalability requirements or require a trustworthy consortium, which is challenging for increasingly dynamic supply chains with constantly changing participants. In this paper, we propose CCChain, a scalable and privacy-aware supply chain management system that stores all information locally to give companies complete sovereignty over who accesses their data. Still, tamper protection of all data through a permissionless blockchain enables on-demand tracking and tracing of products as well as reliable information sharing while affording the detection of data inconsistencies. Our evaluation confirms that CCChain offers superior scalability in comparison to alternatives while also enabling near real-time tracking and tracing for many, less complex products.
supply chain management; blockchain; permissionless; deployment; tracing and tracking; privacy
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wagner-ccchain.pdf
IEEE
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China
Shanghai, China
May 2-5, 2022
978-1-6654-9538-7/22
10.1109/ICBC54727.2022.9805503
1
EricWagner
RomanMatzutt
JanPennekamp
LennartBader
IrakliBajelidze
KlausWehrle
MartinHenze
inproceedings
2022_matzutt_redactchain
A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content
2022
5
3
Blockchains gained tremendous attention for their capability to provide immutable and decentralized event ledgers that can facilitate interactions between mutually distrusting parties. However, precisely this immutability and the openness of permissionless blockchains raised concerns about the consequences of illicit content being irreversibly stored on them. Related work coined the notion of redactable blockchains, which allow for removing illicit content from their history without affecting the blockchain's integrity. While honest users can safely prune identified content, current approaches either create trust issues by empowering fixed third parties to rewrite history, cannot react quickly to reported content due to using lengthy public votings, or create large per-redaction overheads.
In this paper, we instead propose to outsource redactions to small and periodically exchanged juries, whose members can only jointly redact transactions using chameleon hash functions and threshold cryptography. Multiple juries are active at the same time to swiftly redact reported content. They oversee their activities via a global redaction log, which provides transparency and allows for appealing and reversing a rogue jury's decisions. Hence, our approach establishes a framework for the swift and transparent moderation of blockchain content. Our evaluation shows that our moderation scheme can be realized with feasible per-block and per-redaction overheads, i.e., the redaction capabilities do not impede the blockchain's normal operation.
redactable blockchain; illicit content; chameleon hash functions; threshold cryptography
mynedata; impact-digital; digital-campus
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-matzutt-redactchain.pdf
IEEE
Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22), May 2-5, 2022, Shanghai, China
Shanghai, China
May 2-5, 2022
978-1-6654-9538-7/22
10.1109/ICBC54727.2022.9805508
1
RomanMatzutt
VincentAhlrichs
JanPennekamp
RomanKarwacik
KlausWehrle
article
2022_brauner_iop
A Computer Science Perspective on Digital Transformation in Production
ACM Transactions on Internet of Things
2022
5
1
3
2
The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.
Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf
ACM
2691-1914
10.1145/3502265
1
PhilippBrauner
ManuelaDalibor
MatthiasJarke
IkeKunze
IstvánKoren
GerhardLakemeyer
MartinLiebenberg
JudithMichael
JanPennekamp
ChristophQuix
BernhardRumpe
Wilvan der Aalst
KlausWehrle
AndreasWortmann
MartinaZiefle
techreport
draft-irtf-coinrg-use-cases-02
Use Cases for In-Network Computing
2022
3
draft-irtf-coinrg-use-cases-02
expires: 8 September 2022 (work in progress)
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf
https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/
Online
IETF Trust
Internet Drafts
Internet Engineering Task Force
Internet Engineering Task Force
IkeKunze
KlausWehrle
DirkTrossen
Marie-JoséMontpetit
Xavierde Foy
DavidGriffin
MiguelRio
inproceedings
2021_mitseva_sequences
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages
2021
11
17
2411-2413
Website fingerprinting (WFP) is a special case of traffic analysis, where a passive attacker infers information about the content of encrypted and anonymized connections by observing patterns of data flows. Although modern WFP attacks pose a serious threat to online privacy of users, including Tor users, they usually aim to detect single pages only. By ignoring the browsing behavior of users, the attacker excludes valuable information: users visit multiple pages of a single website consecutively, e.g., by following links. In this paper, we propose two novel methods that can take advantage of the consecutive visits of multiple pages to detect websites. We show that two up to three clicks within a site allow attackers to boost the accuracy by more than 20% and to dramatically increase the threat to users' privacy. We argue that WFP defenses have to consider this new dimension of the attack surface.
Traffic Analysis; Website Fingerprinting; Web Privacy
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mitseva-fingerprinting-sequences.pdf
ACM
Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea
Seoul, Korea
November 15-19, 2021
978-1-4503-8454-4/21/11
10.1145/3460120.3485347
1
AsyaMitseva
JanPennekamp
JohannesLohmöller
TorstenZiemann
CarlHoerchner
KlausWehrle
AndriyPanchenko
article
2021_pennekamp_accountable_manufacturing
The Road to Accountable and Dependable Manufacturing
Automation
2021
9
13
2
3
202-219
The Internet of Things provides manufacturing with rich data for increased automation. Beyond company-internal data exploitation, the sharing of product and manufacturing process data along and across supply chains enables more efficient production flows and product lifecycle management. Even more, data-based automation facilitates short-lived ad hoc collaborations, realizing highly dynamic business relationships for sustainable exploitation of production resources and capacities. However, the sharing and use of business data across manufacturers and with end customers add requirements on data accountability, verifiability, and reliability and needs to consider security and privacy demands. While research has already identified blockchain technology as a key technology to address these challenges, current solutions mainly evolve around logistics or focus on established business relationships instead of automated but highly dynamic collaborations that cannot draw upon long-term trust relationships. We identify three open research areas on the road to such a truly accountable and dependable manufacturing enabled by blockchain technology: blockchain-inherent challenges, scenario-driven challenges, and socio-economic challenges. Especially tackling the scenario-driven challenges, we discuss requirements and options for realizing a blockchain-based trustworthy information store and outline its use for automation to achieve a reliable sharing of product information, efficient and dependable collaboration, and dynamic distributed markets without requiring established long-term trust.
blockchain; supply chain management; Industry 4.0; manufacturing; secure industrial collaboration; scalability; Industrial Internet of Things; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-manufacturing.pdf
MDPI
2673-4052
10.3390/automation2030013
1
JanPennekamp
RomanMatzutt
Salil S.Kanhere
JensHiller
KlausWehrle
article
2021_matzutt_coinprune_v2
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively
IEEE Transactions on Network and Service Management
2021
9
10
18
3
3064-3078
Popular cryptocurrencies continue to face serious scalability issues due to their ever-growing blockchains. Thus, modern blockchain designs began to prune old blocks and rely on recent snapshots for their bootstrapping processes instead. Unfortunately, established systems are often considered incapable of adopting these improvements. In this work, we present CoinPrune, our block-pruning scheme with full Bitcoin compatibility, to revise this popular belief. CoinPrune bootstraps joining nodes via snapshots that are periodically created from Bitcoin's set of unspent transaction outputs (UTXO set). Our scheme establishes trust in these snapshots by relying on CoinPrune-supporting miners to mutually reaffirm a snapshot's correctness on the blockchain. This way, snapshots remain trustworthy even if adversaries attempt to tamper with them. Our scheme maintains its retrospective deployability by relying on positive feedback only, i.e., blocks containing invalid reaffirmations are not rejected, but invalid reaffirmations are outpaced by the benign ones created by an honest majority among CoinPrune-supporting miners. Already today, CoinPrune reduces the storage requirements for Bitcoin nodes by two orders of magnitude, as joining nodes need to fetch and process only 6 GiB instead of 271 GiB of data in our evaluation, reducing the synchronization time of powerful devices from currently 7 h to 51 min, with even larger potential drops for less powerful devices. CoinPrune is further aware of higher-level application data, i.e., it conserves otherwise pruned application data and allows nodes to obfuscate objectionable and potentially illegal blockchain content from their UTXO set and the snapshots they distribute.
blockchain; block pruning; synchronization; bootstrapping; scalability; velvet fork; Bitcoin
mynedata; impact_digital; digital_campus
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-matzutt-coinprune-v2.pdf
English
1932-4537
10.1109/TNSM.2021.3073270
1
RomanMatzutt
BenediktKalde
JanPennekamp
ArthurDrichel
MartinHenze
KlausWehrle
inproceedings
2021_mangel_reshare
Data Reliability and Trustworthiness through Digital Transmission Contracts
2021
6
8
12731
265-283
As decision-making is increasingly data-driven, trustworthiness and reliability of the underlying data, e.g., maintained in knowledge graphs or on the Web, are essential requirements for their usability in the industry. However, neither traditional solutions, such as paper-based data curation processes, nor state-of-the-art approaches, such as distributed ledger technologies, adequately scale to the complex requirements and high throughput of continuously evolving industrial data. Motivated by a practical use case with high demands towards data trustworthiness and reliability, we identify the need for digitally-verifiable data immutability as a still insufficiently addressed dimension of data quality. Based on our discussion of shortcomings in related work, we thus propose ReShare, our novel concept of digital transmission contracts with bilateral signatures, to address this open issue for both RDF knowledge graphs and arbitrary data on the Web. Our quantitative evaluation of ReShare’s performance and scalability reveals only moderate computation and communication overhead, indicating significant potential for cost-reductions compared to today’s approaches. By cleverly integrating digital transmission contracts with existing Web-based information systems, ReShare provides a promising foundation for data sharing and reuse in Industry 4.0 and beyond, enabling digital accountability through easily-adoptable digitally-verifiable data immutability and non-repudiation.
Lecture Notes in Computer Science (LNCS), Volume 12731
Digital transmission contracts; Trust; Data immutability; Non-repudiation; Accountability; Data dynamics; Linked Data; Knowledge graphs
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mangel-eswc-reshare.pdf
Springer
Proceedings of the 18th Extended Semantic Web Conference (ESWC '21), June 6-10, 2021, Heraklion, Greece
Heraklion, Greece
June 6-10, 2021
978-3-030-77384-7
0302-9743
10.1007/978-3-030-77385-4_16
1
SimonMangel
LarsGleim
JanPennekamp
KlausWehrle
StefanDecker
article
2021_buckhorst_lmas
Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production
Procedia CIRP
2021
5
3
99
448-453
Assembly systems must provide maximum flexibility qualified by organization and technology to offer cost-compliant performance features to differentiate themselves from competitors in buyers' markets. By mobilization of multipurpose resources and dynamic planning, Line-less Mobile Assembly Systems (LMASs) offer organizational reconfigurability. By proposing a holarchy to combine LMASs with the concept of an Internet of Production (IoP), we enable LMASs to source valuable information from cross-level production networks, physical resources, software nodes, and data stores that are interconnected in an IoP. The presented holarchy provides a concept of how to address future challenges, meet the requirements of shorter lead times, and unique lifecycle support. The paper suggests an application of decision making, distributed sensor services, recommender-based data reduction, and in-network computing while considering safety and human usability alike.
Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME '20), July 14-17, 2020, Gulf of Naples, Italy
Internet of Production; Line-less Mobile Assembly System; Industrial Assembly; Smart Factory
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-buckhorst-holarchy.pdf
Elsevier
Gulf of Naples, Italy
July 14-17, 2020
2212-8271
10.1016/j.procir.2021.03.064
1
Armin F.Buckhorst
BenjaminMontavon
DominikWolfschläger
MelanieBuchsbaum
AmirShahidi
HenningPetruck
IkeKunze
JanPennekamp
ChristianBrecher
MathiasHüsing
BurkhardCorves
VerenaNitsch
KlausWehrle
Robert H.Schmitt
article
2021_bader_privaccichain
Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability
Information Processing & Management
2021
5
1
58
3
The benefits of information sharing along supply chains are well known for improving productivity and reducing costs. However, with the shift towards more dynamic and flexible supply chains, privacy concerns severely challenge the required information retrieval. A lack of trust between the different involved stakeholders inhibits advanced, multi-hop information flows, as valuable information for tracking and tracing products and parts is either unavailable or only retained locally. Our extensive literature review of previous approaches shows that these needs for cross-company information retrieval are widely acknowledged, but related work currently only addresses them insufficiently. To overcome these concerns, we present PrivAccIChain, a secure, privacy-preserving architecture for improving the multi-hop information retrieval with stakeholder accountability along supply chains. To address use case-specific needs, we particularly introduce an adaptable configuration of transparency and data privacy within our design. Hence, we enable the benefits of information sharing as well as multi-hop tracking and tracing even in supply chains that include mutually distrusting stakeholders. We evaluate the performance of PrivAccIChain and demonstrate its real-world feasibility based on the information of a purchasable automobile, the e.GO Life. We further conduct an in-depth security analysis and propose tunable mitigations against common attacks. As such, we attest PrivAccIChain's practicability for information management even in complex supply chains with flexible and dynamic business relationships.
multi-hop collaboration; tracking and tracing; Internet of Production; e.GO; attribute-based encryption
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-bader-ipm-privaccichain.pdf
Elsevier
0306-4573
10.1016/j.ipm.2021.102529
1
LennartBader
JanPennekamp
RomanMatzutt
DavidHedderich
MarkusKowalski
VolkerLücken
KlausWehrle
article
2021_schomakers_insights
Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives
Computer Law Review International
2021
2
15
22
1
8-15
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity, Privacy, European Data Protection Law
1610-7608
10.9785/cri-2021-220103
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle
inproceedings
2019_rut_schomakers_privacy
Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity
2021
1
27
857-870
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity,Privacy,European Data Protection Law
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf
https://dl.gi.de/handle/20.500.12116/34788
https://arxiv.org/abs/1911.06569
Gesellschaft für Informatik
Bonn
INFORMATIK 2020
Karlsruhe, Germany
INFORMATIK 2020
2020-09-28 to 2020-10-01
English
10.18420/inf2020_76
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle
article
2021-wehrle-energy
A Novel Receiver Design for Energy Packet‐Based Dispatching
Energy Technology
2021
9
2
10.1002/ente.202000937
1
FriedirchWiegel
EdoardoDe Din
AntonelloMonti
KlausWehrle
MarcHiller
MartinaZitterbart
VeitHagenmeyer
inproceedings
2020_delacadena_trafficsliver
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
2020
11
12
1971-1985
Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction of packets. By collecting traffic traces at a malicious Tor entry node — one of the weakest adversaries in the attacker model of Tor — a passive eavesdropper can leverage the captured meta-data to reveal the websites visited by a Tor user. As recently shown, WFP is significantly more effective and realistic than assumed. Concurrently, former WFP defenses are either infeasible for deployment in real-world settings or defend against specific WFP attacks only.
To limit the exposure of Tor users to WFP, we propose novel lightweight WFP defenses, TrafficSliver, which successfully counter today’s WFP classifiers with reasonable bandwidth and latency overheads and, thus, make them attractive candidates for adoption in Tor. Through user-controlled splitting of traffic over multiple Tor entry nodes, TrafficSliver limits the data a single entry node can observe and distorts repeatable traffic patterns exploited by WFP attacks. We first propose a network-layer defense, in which we apply the concept of multipathing entirely within the Tor network. We show that our network-layer defense reduces the accuracy from more than 98% to less than 16% for all state-of-the-art WFP attacks without adding any artificial delays or dummy traffic. We further suggest an elegant client-side application-layer defense, which is independent of the underlying anonymization network. By sending single HTTP requests for different web objects over distinct Tor entry nodes, our application-layer defense reduces the detection rate of WFP classifiers by almost 50 percentage points. Although it offers lower protection than our network-layer defense, it provides a security boost at the cost of a very low implementation overhead and is fully compatible with today’s Tor network.
Traffic Analysis; Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-delacadena-trafficsliver.pdf
https://github.com/TrafficSliver
ACM
Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS '20), November 9-13, 2020, Orlando, FL, USA
Virtual Event, USA
November 9-13, 2020
978-1-4503-7089-9/20/11
10.1145/3372297.3423351
1
WladimirDe la Cadena
AsyaMitseva
JensHiller
JanPennekamp
SebastianReuter
JulianFilter
KlausWehrle
ThomasEngel
AndriyPanchenko
inproceedings
2020_matzutt_anonboot
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
2020
10
7
531-542
Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrapping processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-colluding privacy peers. However, the typically small number of privacy peers enable single adversaries to mimic distributed services. We thus present AnonBoot, a Sybil-resistant medium to securely bootstrap distributed anonymity services via public blockchains. AnonBoot enforces that peers periodically create a small proof of work to refresh their eligibility for providing secure anonymity services. A pseudo-random, locally replicable bootstrapping process using on-chain entropy then prevents biasing the election of eligible peers. Our evaluation using Bitcoin as AnonBoot's underlying blockchain shows its feasibility to maintain a trustworthy repository of 1000 peers with only a small storage footprint while supporting arbitrarily large user bases on top of most blockchains.
anonymization; bootstrapping; public blockchain; Sybil attack; anonymity network; cryptocurrency tumbler; Bitcoin; Tor
impact_digital; digital_campus
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-matzutt-anonboot.pdf
ACM
Proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS '20), October 5-9, 2020, Taipei, Taiwan
Taipei, Taiwan
ASIACCS 2020
October 5-9, 2020
978-1-4503-6750-9/20/10
10.1145/3320269.3384729
1
RomanMatzutt
JanPennekamp
ErikBuchholz
KlausWehrle
inproceedings
2020_pennekamp_supply_chain_sensing
Secure End-to-End Sensing in Supply Chains
2020
7
1
Trust along digitalized supply chains is challenged by the aspect that monitoring equipment may not be trustworthy or unreliable as respective measurements originate from potentially untrusted parties. To allow for dynamic relationships along supply chains, we propose a blockchain-backed supply chain monitoring architecture relying on trusted hardware. Our design provides a notion of secure end-to-end sensing of interactions even when originating from untrusted surroundings. Due to attested checkpointing, we can identify misinformation early on and reliably pinpoint the origin. A blockchain enables long-term verifiability for all (now trustworthy) IoT data within our system even if issues are detected only after the fact. Our feasibility study and cost analysis further show that our design is indeed deployable in and applicable to today's supply chain settings.
supply chain; trusted computing; trusted execution; blockchain; Internet of Production; condition monitoring
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-supply-chain-sensing.pdf
IEEE
Proceedings of the 5th International Workshop on Cyber-Physical Systems Security (CPS-Sec '20), co-located with the 8th IEEE Conference on Communications and Network Security (CNS '20), June 29-July 1, 2020, Avignon, France
Avignon, France
June 29-July 1, 2020
978-1-7281-4760-4
10.1109/CNS48642.2020.9162337
1
JanPennekamp
FritzAlder
RomanMatzutt
Jan TobiasMühlberg
FrankPiessens
KlausWehrle
inproceedings
2020_matzutt_coinprune
How to Securely Prune Bitcoin’s Blockchain
2020
6
24
298-306
Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day. Despite the benefits of its blockchain, Bitcoin still faces serious scalability issues, most importantly its ever-increasing blockchain size. While alternative designs introduced schemes to periodically create snapshots and thereafter prune older blocks, already-deployed systems such as Bitcoin are often considered incapable of adopting corresponding approaches. In this work, we revise this popular belief and present CoinPrune, a snapshot-based pruning scheme that is fully compatible with Bitcoin. CoinPrune can be deployed through an opt-in velvet fork, i.e., without impeding the established Bitcoin network. By requiring miners to publicly announce and jointly reaffirm recent snapshots on the blockchain, CoinPrune establishes trust into the snapshots' correctness even in the presence of powerful adversaries. Our evaluation shows that CoinPrune reduces the storage requirements of Bitcoin already by two orders of magnitude today, with further relative savings as the blockchain grows. In our experiments, nodes only have to fetch and process 5 GiB instead of 230 GiB of data when joining the network, reducing the synchronization time on powerful devices from currently 5 h to 46 min, with even more savings for less powerful devices.
blockchain; block pruning; synchronization; bootstrapping; scalability; velvet fork; Bitcoin
mynedata; impact_digital; digital_campus
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-matzutt-coinprune.pdf
https://coinprune.comsys.rwth-aachen.de
IEEE
Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France
Paris, France
NETWORKING 2020
June 22-26, 2020
978-3-903176-28-7
1
RomanMatzutt
BenediktKalde
JanPennekamp
ArthurDrichel
MartinHenze
KlausWehrle
inproceedings
2020_pennekamp_supply_chain_accountability
Private Multi-Hop Accountability for Supply Chains
2020
6
7
Today's supply chains are becoming increasingly flexible in nature. While adaptability is vastly increased, these more dynamic associations necessitate more extensive data sharing among different stakeholders while simultaneously overturning previously established levels of trust. Hence, manufacturers' demand to track goods and to investigate root causes of issues across their supply chains becomes more challenging to satisfy within these now untrusted environments. Complementarily, suppliers need to keep any data irrelevant to such routine checks secret to remain competitive. To bridge the needs of contractors and suppliers in increasingly flexible supply chains, we thus propose to establish a privacy-preserving and distributed multi-hop accountability log among the involved stakeholders based on Attribute-based Encryption and backed by a blockchain. Our large-scale feasibility study is motivated by a real-world manufacturing process, i.e., a fine blanking line, and reveals only modest costs for multi-hop tracing and tracking of goods.
supply chain; multi-hop tracking and tracing; blockchain; attribute-based encryption; Internet of Production
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-supply-chain-privacy.pdf
IEEE
Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops '20), 1st Workshop on Blockchain for IoT and Cyber-Physical Systems (BIoTCPS '20), June 7-11, 2020, Dublin, Ireland
Dublin, Ireland
June 7-11, 2020
978-1-7281-7440-2
2474-9133
10.1109/ICCWorkshops49005.2020.9145100
1
JanPennekamp
LennartBader
RomanMatzutt
PhilippNiemietz
DanielTrauth
MartinHenze
ThomasBergs
KlausWehrle
inproceedings
2020-mann-ur-weldseamstudy
Study on weld seam geometry control for connected gas metal arc welding systems
2020
6
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf
Proceedings of the 2020 Internal Conference on Ubiquitous Robots
Internal Conference on Ubiquitous Robots
June 22-26, 2020
10.1109/UR49135.2020.9144839
1
SamuelMann
RenéGlebke
IkeKunze
DominikScheurenberg
RahulSharma
UweReisgen
KlausWehrle
DirkAbel
article
2020_mann_welding_layers
Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers
Advanced Structured Materials
2020
4
1
125
101-118
A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production.
Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19)
Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy
Internet-of-Production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf
Springer
Ponta Delgada, Azores, Portugal
October 24-25, 2019
978-981-15-2956-6
1869-8433
10.1007/978-981-15-2957-3_8
1
SamuelMann
JanPennekamp
TobiasBrockhoff
AnahitaFarhang
MahsaPourbafrani
LukasOster
Merih SeranUysal
RahulSharma
UweReisgen
KlausWehrle
Wilvan der Aalst
inproceedings
2020_matzutt_coralis
A Secure and Practical Decentralized Ecosystem for Shareable Education Material
2020
1
7
529-534
Traditionally, the university landscape is highly federated, which hinders potentials for coordinated collaborations. While the lack of a strict hierarchy on the inter-university level is critical for ensuring free research and higher education, this concurrency limits the access to high-quality education materials. Especially regarding resources such as lecture notes or exercise tasks we observe a high susceptibility to redundant work and lacking quality assessment of material created in isolation by individual university institutes. To remedy this situation, in this paper we propose CORALIS, a decentralized marketplace for offering, acquiring, discussing, and improving education resources across university borders. Our design is based on a permissioned blockchain to (a) realize accountable access control via simple on-chain license terms, (b) trace the evolution of encrypted containers accumulating bundles of shareable education resources, and (c) record user comments and ratings for further improving the quality of offered education material.
blockchain platform; permissioned blockchain; education material; quality assessment; collaborative work
impact_digital
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-matzutt-coralis.pdf
IEEE
Proceedings of the 34th International Conference on Information Networking (ICOIN '20), January 7-10, 2020, Barcelona, Spain
Barcelona, Spain
January 7-10, 2020
978-1-7281-4199-2
10.1109/ICOIN48656.2020.9016478
1
RomanMatzutt
JanPennekamp
KlausWehrle
inproceedings
2019-krude-online-reprogramming
Online Reprogrammable Multi Tenant Switches
2019
12
9
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-krude-online-reprogramming.pdf
ACM
1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)
978-1-4503-7000-4/19/12
10.1145/3359993.3366643
1
JohannesKrude
JacoHofmann
MatthiasEichholz
KlausWehrle
AndreasKoch
MiraMezini
inproceedings
2019_delacadena_countermeasure
POSTER: Traffic Splitting to Counter Website Fingerprinting
2019
11
12
2533-2535
Website fingerprinting (WFP) is a special type of traffic analysis, which aims to infer the websites visited by a user. Recent studies have shown that WFP targeting Tor users is notably more effective than previously expected. Concurrently, state-of-the-art defenses have been proven to be less effective. In response, we present a novel WFP defense that splits traffic over multiple entry nodes to limit the data a single malicious entry can use. Here, we explore several traffic-splitting strategies to distribute user traffic. We establish that our weighted random strategy dramatically reduces the accuracy from nearly 95% to less than 35% for four state-of-the-art WFP attacks without adding any artificial delays or dummy traffic.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-delacadena-splitting-defense.pdf
ACM
Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom
London, United Kingdom
November 11-15, 2019
978-1-4503-6747-9/19/11
10.1145/3319535.3363249
1
WladimirDe la Cadena
AsyaMitseva
JanPennekamp
JensHiller
FabianLanze
ThomasEngel
KlausWehrle
AndriyPanchenko
inproceedings
2019-dahlmanns-icnp-knowledgeSystem
Privacy-Preserving Remote Knowledge System
2019
10
7
More and more traditional services, such as malware detectors or collaboration services in industrial scenarios, move to the cloud. However, this behavior poses a risk for the privacy of clients since these services are able to generate profiles containing very sensitive information, e.g., vulnerability information or collaboration partners. Hence, a rising need for protocols that enable clients to obtain knowledge without revealing their requests exists. To address this issue, we propose a protocol that enables clients (i) to query large cloud-based knowledge systems in a privacy-preserving manner using Private Set Intersection and (ii) to subsequently obtain individual knowledge items without leaking the client’s requests via few Oblivious Transfers. With our preliminary design, we allow clients to save a significant amount of time in comparison to performing Oblivious Transfers only.
Poster Session
private query protocol; knowledge system; remote knowledge; private set intersection; oblivious transfer
kimusin; internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-dahlmanns-knowledge-system.pdf
IEEE
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Chicago, IL, USA
27th IEEE International Conference on Network Protocols (ICNP 2019)
7-10. Oct. 2019
978-1-7281-2700-2
2643-3303
10.1109/ICNP.2019.8888121
1
MarkusDahlmanns
ChrisDax
RomanMatzutt
JanPennekamp
JensHiller
KlausWehrle
inproceedings
2019_pennekamp_multipath
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
2019
10
7
Users of an onion routing network, such as Tor, depend on its anonymity properties. However, especially malicious entry nodes, which know the client’s identity, can also observe the whole communication on their link to the client and, thus, conduct several de-anonymization attacks. To limit this exposure and to impede corresponding attacks, we propose to multipath traffic between the client and the middle node to reduce the information an attacker can obtain at a single vantage point. To facilitate the deployment, only clients and selected middle nodes need to implement our approach, which works transparently for the remaining legacy nodes. Furthermore, we let clients control the splitting strategy to prevent any external manipulation.
Poster Session
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-multipathing.pdf
IEEE
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Chicago, IL, USA
27th IEEE International Conference on Network Protocols (ICNP 2019)
7-10. Oct. 2019
978-1-7281-2700-2
2643-3303
10.1109/ICNP.2019.8888029
1
JanPennekamp
JensHiller
SebastianReuter
WladimirDe la Cadena
AsyaMitseva
MartinHenze
ThomasEngel
KlausWehrle
AndriyPanchenko
inproceedings
2019-krude-chain-opt
Optimizing Data Plane Programs for the Network
2019
8
23
With the move of Software-defined networking from fixed to programmable data planes, network functions are written with P4 or eBPF for targets such as programmable switches, CPU based flow processors and commodity CPUs.
These data plane programs are, however, limited in per-packet time budget (e.g., 67.2 ns at 10GbE) and program size, making program optimization imperative.
Existing approaches focus on optimizing the distribution of flow rules in fixed data planes or they are limited to a single switch.
We see great potential in integrating the network topology into program optimization.
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-krude-chain-opt.pdf
ACM
NetPL '19: ACM SIGCOMM Workshop on Networking and Programming Languages
Beijing, China
978-1-4503-6877-3/19/08
10.1145/3341561.3349590
1
JohannesKrude
MatthiasEichholz
MaximilianWinck
KlausWehrle
MiraMezini
inproceedings
ReelfsMHH2019
Hashtag Usage in a Geographically-Local Microblogging App
2019
5
13
919-927
Anonymous Messaging; Location Based Messaging; User Behavior and Engagement; Information Diffusion; Hashtag
comtex
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-reelfs-jodel-hashtags.pdf
ACM
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA
San Francisco, California, USA
International Workshop on Location and the Web
May 13–17, 2019
978-1-4503-6675-5/19/05
10.1145/3308560.3316537
1
HelgeReelfs
TimonMohaupt
OliverHohlfeld
NiklasHenckell
inproceedings
2019_pennekamp_infrastructure
Towards an Infrastructure Enabling the Internet of Production
2019
5
8
31-37
New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.
Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf
IEEE
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW
Taipei, TW
May 6-9, 2019
978-1-5386-8500-6/19
10.1109/ICPHYS.2019.8780276
1
JanPennekamp
RenéGlebke
MartinHenze
TobiasMeisen
ChristophQuix
RihanHai
LarsGleim
PhilippNiemietz
MaximilianRudack
SimonKnape
AlexanderEpple
DanielTrauth
UweVroomen
ThomasBergs
ChristianBrecher
AndreasBührig-Polaczek
MatthiasJarke
KlausWehrle
inproceedings
2019_wagner_dispute_resolution
Dispute Resolution for Smart Contract-based Two Party Protocols
2019
5
Blockchain systems promise to mediate interactions of mutually distrusting parties without a trusted third party. However, protocols with full smart contract-based security are either limited in functionality or complex, with high costs for secured interactions. This observation leads to the development of protocol-specific schemes to avoid costly dispute resolution in case all participants remain honest. In this paper, we introduce SmartJudge, an extensible generalization of this trend for smart contract-based two-party protocols. SmartJudge relies on a protocol-independent mediator smart contract that moderates two-party interactions and only consults protocol-specific verifier smart contracts in case of a dispute. This way, SmartJudge avoids verification costs in absence of disputes and sustains interaction confidentiality among honest parties. We implement verifier smart contracts for cross-blockchain trades and exchanging digital goods and show that SmartJudge can reduce costs by 46-50% and 22% over current state of the art, respectively.
Ethereum,Bitcoin,smart contracts,two-party protocols,dispute resolution,cross-blockchain trades
mynedata,impact-digital
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wagner-dispute.pdf
IEEE
IEEE International Conference on Blockchain and Cryptocurrency 2019 (ICBC 2019)
Seoul, South Korea
IEEE International Conference on Blockchain and Cryptocurrency 2019
English
10.1109/BLOC.2019.8751312
1
EricWagner
AchimVölker
FrederikFuhrmann
RomanMatzutt
KlausWehrle
inproceedings
2019-glebke-hicss-integrated
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
2019
1
8
7252-7261
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-integrated.pdf
Online
University of Hawai'i at Manoa / AIS
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA
en
978-0-9981331-2-6
10.24251/HICSS.2019.871
1
RenéGlebke
MartinHenze
KlausWehrle
PhilippNiemietz
DanielTrauth
PatrickMattfeld
ThomasBergs
inproceedings
2018-bader-ethereum-car-insurance
Smart Contract-based Car Insurance Policies
2018
12
9
mynedata,iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-bader-ethereum-car-insurance.pdf
https://ieeexplore.ieee.org/document/8644136
IEEE
2018 IEEE Globecom Workshops (GC Wkshps)
Abu Dhabi, United Arab Emirates
1st International Workshop on Blockchain in IoT, co-located with IEEE Globecom 2018
2018-12-09
10.1109/GLOCOMW.2018.8644136
1
LennartBader
Jens ChristophBürger
RomanMatzutt
KlausWehrle
inproceedings
2018-ziegeldorf-shield
SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments
2018
12
1-15
iop,mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-acsac-shield.pdf
ACM
New York, NY, USA
Proceedings of the 34rd Annual Computer Security Applications Conference
San Juan, Puerto Rico, USA
The 34rd Annual Computer Security Applications Conference (ACSAC 2018)
2018-12-03 - 2018-12-07
English
10.1145/3274694.3274716
1
Jan HenrikZiegeldorf
JanMetzke
KlausWehrle
inproceedings
2018-matzutt-bitcoin-content-countermeasures
Thwarting Unwanted Blockchain Content Insertion
2018
4
17
364-370
Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous increase in adoption. By providing a persistent, distributed, and append-only ledger, blockchains enable numerous applications such as distributed consensus, robustness against equivocation, and smart contracts. However, recent studies show that blockchain systems such as Bitcoin can be (mis)used to store arbitrary content. This has already been used to store arguably objectionable content on Bitcoin's blockchain. Already single instances of clearly objectionable or even illegal content can put the whole system at risk by making its node operators culpable. To overcome this imminent risk, we survey and discuss the design space of countermeasures against the insertion of such objectionable content. Our analysis shows a wide spectrum of potential countermeasures, which are often combinable for increased efficiency. First, we investigate special-purpose content detectors as an ad hoc mitigation. As they turn out to be easily evadable, we also investigate content-agnostic countermeasures. We find that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain.
Bitcoin,blockchain,security,objectionable content,countermeasure
mynedata,iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-matzutt-blockchain-contents-countermeasures.pdf
https://ieeexplore.ieee.org/document/8360355
IEEE
Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), co-located with the IEEE International Conference on Cloud Engineering 2018 (IC2E 2018)
Orlando, Florida, USA
First IEEE Workshop on Blockchain Technologies and Applications (BTA)
2018-04-17
English
978-1-5386-5008-0
10.1109/IC2E.2018.00070
1
RomanMatzutt
MartinHenze
Jan HenrikZiegeldorf
JensHiller
KlausWehrle
article
2018-scheitle-ccr-caa
A First Look at Certification Authority Authorization (CAA)
ACM SIGCOMM Computer Communications Review (CCR)
2018
4
48
10-23
https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf
internet-measurements
https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf
https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/
2018-06-05
10.1145/3213232.3213235
1
QuirinScheitle
TaejoongChung
JensHiller
OliverGasser
JohannesNaab
Rolandvan Rijswijk-Deij
OliverHohlfeld
RalphHolz
DaveChoffnes
AlanMislove
GeorgCarle
article
2016-fgcs-ziegeldorf-bitcoin
Secure and anonymous decentralized Bitcoin mixing
Future Generation Computer Systems
2018
3
80
448-466
Pseudonymity, anonymity, and untraceability
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf
Online
Elsevier
en
0167-739X
10.1016/j.future.2016.05.018
1
Jan HenrikZiegeldorf
RomanMatzutt
MartinHenze
FredGrossmann
KlausWehrle
inproceedings
2018-matzutt-bitcoin-content
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
2018
2
26
Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf
2018-01-07
Online
Springer
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Nieuwpoort, Curaçao
Financial Cryptography and Data Security 2018
en
10.1007/978-3-662-58387-6_23
1
RomanMatzutt
JensHiller
MartinHenze
Jan HenrikZiegeldorf
DirkMüllmann
OliverHohlfeld
KlausWehrle
inproceedings
2018-dedin-energy-packets
A new solution for the Energy Packet-based Dispatching using power/signal dual modulation
2018
Proceedings of the Ninth International Conference on Future Energy Systems (ACM e-Energy '18)
Karlsruhe, Germany
Ninth International Conference on Future Energy Systems
2018-06-15
10.1145/3208903.3208931
1
EdoardoDe Din
AntonelloMonti
VeitHagenmeyer
KlausWehrle
incollection
2017-cps-henze-network
Network Security and Privacy for Cyber-Physical Systems
2017
11
13
25-56
sensorcloud,ipacs
Song, Houbing and Fink, Glenn A. and Jeschke, Sabina
Wiley-IEEE Press
First
2
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
en
978-1-119-22604-8
10.1002/9781119226079.ch2
1
MartinHenze
JensHiller
RenéHummen
RomanMatzutt
KlausWehrle
Jan HenrikZiegeldorf
inproceedings
2017-henze-mobiquitous-cloudanalyzer
CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps
2017
11
7
262-271
Developers of smartphone apps increasingly rely on cloud services for ready-made functionalities, e.g., to track app usage, to store data, or to integrate social networks. At the same time, mobile apps have access to various private information, ranging from users' contact lists to their precise locations. As a result, app deployment models and data flows have become too complex and entangled for users to understand. We present CloudAnalyzer, a transparency technology that reveals the cloud usage of smartphone apps and hence provides users with the means to reclaim informational self-determination. We apply CloudAnalyzer to study the cloud exposure of 29 volunteers over the course of 19 days. In addition, we analyze the cloud usage of the 5000 most accessed mobile websites as well as 500 popular apps from five different countries. Our results reveal an excessive exposure to cloud services: 90 % of apps use cloud services and 36 % of apps used by volunteers solely communicate with cloud services. Given the information provided by CloudAnalyzer, users can critically review the cloud usage of their apps.
Privacy; Smartphones; Cloud Computing; Traffic Analysis
trinics
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-mobiquitous-cloudanalyzer.pdf
Online
ACM
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '17), November 7-10, 2017, Melbourne, VIC, Australia
Melbourne, VIC, Australia
November 7-10, 2017
en
978-1-4503-5368-7
10.1145/3144457.3144471
1
MartinHenze
JanPennekamp
DavidHellmanns
ErikMühmer
Jan HenrikZiegeldorf
ArthurDrichel
KlausWehrle
inproceedings
2017-panchenko-wpes-fingerprinting
Analysis of Fingerprinting Techniques for Tor Hidden Services
2017
10
30
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-panchenko-wpes-fingerprinting.pdf
Online
ACM
Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), co-located with the 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA
en
978-1-4503-5175-1
10.1145/3139550.3139564
1
AndriyPanchenko
AsyaMitseva
MartinHenze
FabianLanze
KlausWehrle
ThomasEngel
inproceedings
2017-henze-trustcom-dcam
Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things
2017
8
1
185-192
sscilops, ipacs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-trustcom-dcam.pdf
Online
IEEE
Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, NSW, Australia
en
978-1-5090-4905-9
2324-9013
10.1109/Trustcom/BigDataSE/ICESS.2017.236
1
MartinHenze
BenediktWolters
RomanMatzutt
TorstenZimmermann
KlausWehrle
inproceedings
2017-maurer-trustcom-coinjoin
Anonymous CoinJoin Transactions with Arbitrary Values
2017
8
1
522-529
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-maurer-trustcom-coinjoin.pdf
Online
IEEE
2017 IEEE Trustcom/BigDataSE/ICESS
Sydney, NSW, Australia
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
1. - 4. August 2017
978-1-5090-4906-6
2324-9013
10.1109/Trustcom/BigDataSE/ICESS.2017.280
1
Felix KonstantinMaurer
TillNeudecker
MartinFlorian
article
2017-ziegeldorf-bmcmedgenomics-bloom
BLOOM: BLoom filter based Oblivious Outsourced Matchings
BMC Medical Genomics
2017
7
26
10
Suppl 2
29-42
Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-Bloom and PHE-Bloom, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-Bloom is fully secure in the semi-honest model while PHE-Bloom slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-Bloom is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (σ=8.73 s) with our first approach and a mere 0.07 s (σ=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-Bloom, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-Bloom, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude.
Proceedings of the 5th iDASH Privacy and Security Workshop 2016
Secure outsourcing; Homomorphic encryption; Bloom filters
sscilops; mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-bmcmedgenomics-bloom.pdf
Online
BioMed Central
Chicago, IL, USA
November 11, 2016
en
1755-8794
10.1186/s12920-017-0277-y
1
Jan HenrikZiegeldorf
JanPennekamp
DavidHellmanns
FelixSchwinger
IkeKunze
MartinHenze
JensHiller
RomanMatzutt
KlausWehrle
article
dombrowski-vdi
Funktechnologien für Industrie 4.0
VDE Positionspapier
2017
6
1
VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.
Stresemannallee 15, 60596 Frankfurt am Main, Germany
IsmetAktas
AlexanderBentkus
FlorianBonanati
ArminDekorsy
ChristianDombrowski
MichaelDoubrava
AliGolestani
FrankHofmann
MikeHeidrich
StefanHiensch
RüdigerKays
MichaelMeyer
AndreasMüller
Stephanten Brink
NedaPetreska
MilanPopovic
LutzRauchhaupt
AhmadSaad
HansSchotten
ChristophWöste
IngoWolff
inproceedings
2017-henze-ic2e-prada
Practical Data Compliance for Cloud Storage
2017
4
4
252-258
ssiclops, ipacs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-ic2e-prada.pdf
Online
IEEE
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada
en
978-1-5090-5817-4
10.1109/IC2E.2017.32
1
MartinHenze
RomanMatzutt
JensHiller
ErikMühmer
Jan HenrikZiegeldorf
Johannesvan der Giet
KlausWehrle
inproceedings
2017-ziegeldorf-codaspy-priward
Privacy-Preserving HMM Forward Computation
2017
3
22
83-94
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf
Online
ACM
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA
en
978-1-4503-4523-1
10.1145/3029806.3029816
1
Jan HenrikZiegeldorf
JanMetzke
JanRüth
MartinHenze
KlausWehrle
inproceedings
2017-matzutt-mynedata
myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data
2017
1073-1084
Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.
Presentation slides are in German
Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling
mynedata_show
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf
https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf
Presentation slides
Eibl, Maximilian and Gaedke, Martin
Gesellschaft für Informatik, Bonn
INFORMATIK 2017
Chemnitz
INFORMATIK 2017
2017-09-28
English
978-3-88579-669-5
1617-5468
10.18420/in2017_109
1
RomanMatzutt
DirkMüllmann
Eva-MariaZeissig
ChristianeHorst
KaiKasugai
SeanLidynia
SimonWieninger
Jan HenrikZiegeldorf
GerhardGudergan
IndraSpiecker gen. Döhmann
KlausWehrle
MartinaZiefle
inproceedings
2016-henze-cloudcom-trinics
Towards Transparent Information on Individual Cloud Service Usage
2016
12
12
366-370
trinics
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf
Online
IEEE
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg
en
978-1-5090-1445-3
10.1109/CloudCom.2016.0064
1
MartinHenze
DanielKerpen
JensHiller
MichaelEggert
DavidHellmanns
ErikMühmer
OussamaRenuli
HenningMaier
ChristianStüble
RogerHäußling
KlausWehrle
inproceedings
2016-mitseva-ccs-fingerprinting
POSTER: Fingerprinting Tor Hidden Services
2016
10
24
1766-1768
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-mitseva-ccs-fingerprinting.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989054
1
AsyaMitseva
AndriyPanchenko
FabianLanze
MartinHenze
KlausWehrle
ThomasEngel
inproceedings
2016-matzutt-ccs-bitcoin
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
2016
10
24
1769-1771
mynedata
/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989059
1
RomanMatzutt
OliverHohlfeld
MartinHenze
RobinRawiel
Jan HenrikZiegeldorf
KlausWehrle
techreport
2016-henze-aib-sensorcloud
The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud
2016
7
11
AIB-2016-06
arXiv:1607.03239 [cs.NI]
1--24
sensorcloud
fileadmin/papers/2016/2016-henze-aib-sensorcloud.pdf
Online
Department of Computer Science, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen University
Technical Report
en
0935-3232
MartinHenze
RenéHummen
RomanMatzutt
KlausWehrle
proceedings
2016-Jakobs-EURAS
Co-opetition and Open Innovation. Proc. 21st EURAS Annual Standardisation Conference, 2016, Montpellier, France
2016
5
Online
Mainz
EN
978-3-95886-103-9
1
KaiJakobs
AnneMione
Anne-FrancoiseCutting-Decelle
SophieMignon
techreport
2015-draft-moskowitz-hip-dex-04
HIP Diet EXchange (DEX)
2015
7
20
draft-moskowitz-hip-dex-04
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-04
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2015-draft-moskowitz-hip-dex-03
HIP Diet EXchange (DEX)
2015
6
19
draft-moskowitz-hip-dex-03
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-03
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
inproceedings
2015-ziegeldorf-iwpe-comparison
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
2015
5
21
198-205
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf
Online
IEEE
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA
en
10.1109/SPW.2015.9
1
Jan HenrikZiegeldorf
JanMetzke
MartinHenze
KlausWehrle
proceedings
2015-sdnflex-heuschkel-dyns
Protocol Virtualization through Dynamic Network Stacks
2015
3
9
IEEE
Cottbus
SDNFlex Workshop (NetSys 2015)
March 2015, 9-12
en
10.1109/NetSys.2015.7089055
1
JensHeuschkel
ImmanuelSchweizer
TorstenZimmermann
KlausWehrle
MaxMühlhäuser
techreport
2014-draft-moskowitz-hip-dex-02
HIP Diet EXchange (DEX)
2014
12
19
draft-moskowitz-hip-dex-02
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-02
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
incollection
2014-tcc-henze-trustpoint
A Trust Point-based Security Architecture for Sensor Data in the Cloud
2014
12
14
77-106
sensorcloud
Online
Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard
Springer
Trusted Cloud Computing
978-3-319-12717-0
10.1007/978-3-319-12718-7_6
1
MartinHenze
RenéHummen
RomanMatzutt
KlausWehrle
article
2014-cheng-acta-geodyn-geomater
Use of MEMS accelerometers/inclinometers as a geotechnical monitoring method for ground subsidence
Acta Geodynamica et Geomaterialia
2014
10
8
11
4
1--12
Accelerometer and inclinometer are inertial sensors capable of measuring corresponding magnitude of Earth gravitational field along the direction of each axis. By means of rotation matrices related to inertial navigation methods, the output values of a three-dimensional accelerometer or a two-dimensional inclinometer can be transformed and processed into the azimuth and dip angle of the monitored target. With the rapid growth in development and cost reduction of Micro Electro Mechanical Systems (MEMS) and Wireless Sensor Network (WSN) in recent years, the engineers are able to carry out real-time wireless geotechnical monitoring during construction. In this paper, we set up a one-day measurement implemented by a self- developed wireless MEMS monitoring system on the surface in the construction site of South Hongmei Road super high way tunnel in Shanghai, by making use of rotation matrices in specific ways, the raw data are processed to expressions of three-dimensional normal vectors that represent the change of the ground. After unifying the vectors in the same coordinate system, we conduct a brief ground settlement analysis by means of an evaluation of the dip angles in the cross section and the azimuths of the sensor nodes.
http://www.irsm.cas.cz/index_en.php?page=acta_detail_doi&id=96
Online
Institute of Rock Structure and Mechanics of the ASCR, v.v.i.
Prague, Czech Republic
Online
en
2336-4351
10.13168/AGG.2014.0015
1
ChengLi
TomásFernández-Steeger
Jó AgilaBitsch Link
MatthiasMay
RafigAzzam
techreport
2014-draft-moskowitz-hip-dex-01
HIP Diet EXchange (DEX)
2014
3
4
draft-moskowitz-hip-dex-01
This document specifies the Host Identity Protocol Diet EXchange (HIP
DEX), a variant of the HIP Base EXchange (HIP BEX) [rfc5201-bis].
The HIP DEX protocol design aims at reducing the overhead of the
employed cryptographic primitives by omitting public-key signatures
and hash functions. In doing so, the main goal is to still deliver
similar security properties to HIP BEX.
The HIP DEX protocol is primarily targeted at computation or memory-constrained sensor devices. Like HIP BEX, it is expected to be used
together with another suitable security protocol such as the
Encapsulated Security Payload (ESP) [rfc5202-bis] for the protection
of upper layer protocols. HIP DEX can also be used as a keying
mechanism for a MAC layer security protocol as is supported by IEEE
802.15.4 [IEEE.802-15-4.2011].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-01
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
inproceedings
2014-comsnets-aktas-graph-based-redundancy-removal
Graph-based Redundancy Removal Approach for Multiple Cross-Layer Interactions
2014
1
7
1-8
crawler
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-aktas-comsnets-redundancy.pdf
Online
IEEE
Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India
Bangalore, India
2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)
7-10 January, 2014
en
978-1-4799-3635-9
10.1109/COMSNETS.2014.6734899
1
IsmetAktas
MartinHenze
Muhammad HamadAlizai
KevinMöllering
KlausWehrle
book
2014-EURAS-Jakobs
Cooperation among standardisation organisations and the scientific and academic community. Proceedings of the 19th EURAS Conference.
2014
Kai Jakobs & Ivana Mijatovic
Mainz Academic Publisher
KaiJakobs
IvanaMijatovic
article
2013-ijghpc-henze-sensorcloud
Maintaining User Control While Storing and Processing Sensor Data in the Cloud
International Journal of Grid and High Performance Computing (IJGHPC)
2013
12
5
4
97-112
sensorcloud
fileadmin/papers/2013/2013-ijghpc-henze-sensorcloud.pdf
Online
IGI Global
en
1938-0259
10.4018/ijghpc.2013100107
1
MartinHenze
RenéHummen
RomanMatzutt
DanielCatrein
KlausWehrle
inproceedings
2013-wisec-garcia-securing
Securing the IP-based Internet of Things with HIP and DTLS
2013
4
119--124
ACM
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)
978-1-4503-1998-0
10.1145/2462096.2462117
1
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
PedroMoreno-Sanchez
FranciscoVidal-Meca
Jan HenrikZiegeldorf
inproceedings
2013-pitsac-vidalmeca-hip
HIP security architecture for the IP-based Internet of Things
2013
3
25
1331 - 1336
The IP-based Internet of Things refers to the
pervasive interactions of smart objects and people enabling
new applications by means of IP protocols. An application
scenario is a Smart City in which the city infrastructure,
cars, and people exchange information to enable new services.
IP protocols, such as IPv6, TCP and HTTP will be further
complemented by IPv6 over Low powerWireless Personal Area
Networks and Constrained Application Protocol currently in
development in IETF. Security and privacy are a must for
the IP-based IoTs in order to ensure its acceptance. However,
mobility, limited bandwidth, and resource-constrained devices
pose new challenges and require for a sound and efficient
security architecture. In particular, dynamic association of
mobile smart objects and the management of keys in large-scale
networks remain an open challenge. In this context, we propose
a flexible security architecture based on the Host Identity
Protocol and Multimedia Internet KEYing protocols allowing
for secure network association and key management. HIP -
based on asymmetric-key cryptography - ensures unambiguous
thing identification, mobility support, as well as a lightweight
and secure method for network association. In our solution,
HIP is extended with MIKEY capabilities to provide enhanced
key management using polynomials, which allow to generate
pairwise keys with any node based on its identity. This
combination of protocols and crypto-algorithms ensures both
strong security and very good performance as shown by our
implementation and presents clear advantages compared with
other alternatives.
Internet of Things; Security; Network Access; Key Management
Online
IEEE
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013
Barcelona, Spain
25.-28.03.2013
en
10.1109/WAINA.2013.158
1
FranciscoVidal Meca
Jan HenrikZiegeldorf
OscarGarcia-Morchon
Sandeep S.Kumar
Sye LoongKeoh
PedroMoreno-Sanchez
article
2013-fernandez-ceriotti-bitsch-and-then-the-weekend-jsan
“And Then, the Weekend Started”: Story of a WSN Deployment on a Construction Site
Journal of Sensor and Actuator Networks
2013
3
11
2
1
156--171
Wireless Sensor Networks (WSNs) are versatile monitoring systems that can provide a large amount of real-time data in scenarios where wired infrastructures are inapplicable or expensive. This technology is expected to be handled by domain experts, who perceive a WSN as a (promised to be) easy to deploy black box. This work presents the deployment experience of a WSN, as conducted by domain experts, in a ground improvement area. Building upon off-the-shelf solutions, a fuel cell powered gateway and 21 sensor devices measuring acceleration, inclination, temperature and barometric pressure were installed to monitor ground subsidence. We report about how poor GSM service, malfunctioning hardware, unknown communication patterns and obscure proprietary software required in-field ad-hoc solutions. Through the lessons learned, we look forward to investigating how to make the deployment of these systems an easier task.
sensor network deployment; experiences; in-field debugging
http://www.mdpi.com/2224-2708/2/1/156
Online
en
2224-2708
10.3390/jsan2010156
1
TomásFernández-Steeger
MatteoCeriotti
Jó AgilaBitsch Link
MatthiasMay
KlausHentschel
KlausWehrle
conference
EW2013_parruca_gross
On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
2013
8
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models.
ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf
http://www.vde-verlag.de/proceedings-en/563498043.html
vde-verlag
vde-verlag
http://www.vde-verlag.de/
Proceedings: European Wireless 2013
Guildford, UK
2013 - 19th European Wireless Conference
04/16/2012 - 04/18/2013
English
DonaldParruca
MariusGrysla
PetriMähönen
MarinaPetrova
HanZhou
FarshadNaghibi
JamesGross
inproceedings
Mobileoffloading_2013
Mobile Adhoc Offloading in Wireless Ad hoc Network
2013
http://arxiv.org/abs/1401.4528
Proc. of MANIAC 2013: Mobile Offloading competition
MANIAC 2013
Berlin, Germany
DiLi
AsyaMitseva
inproceedings
2012-mobicom-wirtz-sofi
Demo: On-demand Content-centric Wireless Networking
2012
8
451-454
Online
ACM
New York, NY, USA
Proceedings of the 18th ACM Annual International Conference on Mobile Computing and Networking (MobiCom'12), Istanbul, Turkey
Istanbul, Turkey
18th ACM Annual International Conference on Mobile Computing and Networking
22-26 August 2012
en
978-1-4503-1159-5
10.1145/2348543.2348608
1
HannoWirtz
DavidMartin
BenjaminGrap
KlausWehrle
phdthesis
2011-mochon-phdthesis
Security for Pervasive Healthcare
2012
Security for Pervasive Healthcare
Oscar GarciaMochon
techreport
rfc5201-bis-04
<prt>Host Identity Protocol Version 2</prt>
2011
1
1
draft-ietf-hip-rfc5201-bis-04.txt
<prt>expires: July 24, 2011 (work in progress)</prt>
mobile_access
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
Thomas R.Henderson
TobiasHeer
techreport
rfc5201-bis-03
<prt>Host Identity Protocol Version 2</prt>
2010
10
1
draft-ietf-hip-rfc5201-bis-03.txt
<prt>expires: April 26, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
9
1
draft-ietf-hip-rfc5201-bis-01.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
moskowitz-rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-moskowitz-hip-rfc5201-bis-02.txt
<prt>expires: January 2, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-ietf-hip-rfc5201-bis-02.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
inbook
2010-aktas-modeling-application-traffic-bookchapter
Modeling Application Traffic
2010
4
397-426
Springer
18
Modeling and Tools for Network Simulation
978-3-642-12330-6
IsmetAktas
CemMengi
ThomasKing
techreport
moskowitz-rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
3
1
draft-moskowitz-hip-rfc5201-bis-01.txt
<prt>expires: September 10, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz Pekka Nikander
PetriJokela
ThomasR. Henderson
TobiasHeer
inbook
201001ThieleINTECHRatpack
Dynamic Wireless Sensor Networks for Animal Behavior Research
2010
1
629--644
RatPack
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-01-Thiele-INTECH-Ratpack.pdf
http://sciyo.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research
http://www.intechopen.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research
Online
Domenico Campolo
InTech
Vienna, Austria
32
Recent Advances in Biomedical Engineering
en
978-953-7619-57-2
1
JohannesThiele
Jó AgilaBitsch Link
OkuaryOsechas
HanspeterMallot
KlausWehrle
inproceedings
20105munawardynamictinyos
Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks
2010
1-6
Long-term deployments of sensor networks in physically inaccessible environments make remote re-programmability of sensor nodes a necessity. Ranging from full image replacement to virtual machines, a variety of mechanisms exist today to deploy new software or to fix bugs in deployed systems. However, TinyOS - the current state of the art sensor node operating system - is still limited to full image replacement as nodes execute a statically-linked system-image generated at compilation time. In this paper we introduce Dynamic TinyOS to enable the dynamic exchange of software components and thus incrementally update the operating system and its applications. The core idea is to preserve the modularity of TinyOS, i.e. its componentization, which is lost during the normal compilation process, and enable runtime composition of TinyOS components on the sensor node. The proposed solution integrates seamlessly into the system architecture of TinyOS: It does not require any changes to the programming model of TinyOS and existing components can be reused transparently. Our evaluation shows that Dynamic TinyOS incurs a low performance overhead while keeping a smaller - upto one third - memory footprint than other comparable solutions.
fileadmin/papers/2010/2010-05-icc-munawar-DynamicTinyOS.pdf
Online
IEEE
Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa
en
978-1-4244-6402-9
1550-3607
1
WaqaasMunawar
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
techreport
200908munawarfgsndynamictinyos
Remote Incremental Adaptation of Sensor Network Applications
2009
9
9-12
fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf
http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
Technical University Hamburg
en
WaqaasMunawar
OlafLandsiedel
Muhammad HamadAlizai
KlausWehrle
proceedings
2009-aktas-maple-ModeldrivenSupportforSourceCodeVariabilityinAutomotiveSoftwareEngineering-Workshop
Model-driven Support for Source Code Variability in Automotive Software Engineering
2009
8
44-51
Variability on source code level in automotive soft- ware engineering is handled by C/C++ preprocessing directives. It provides fine-grained definition of variation points, but brings highly complex structures into the source code. The software gets more difficult to understand, to maintain and to integrate changes. Current approaches for modeling and managing vari- ability on source code do not consider the specific requirements of the automotive domain. To close this gap, we propose a model- driven approach to support software engineers in handling source code variability and configuration of software variants. For this purpose, a variability model is developed that is linked with the source code. Using this approach, a software engineer can shift work steps to the variability model in order to model and manage variation points and implement their variants in the source code.
automotive software engineering; programming; model-driven engineering; variability modeling;
Online
CEUR
1st International Workshop on Model-driven Approaches in Software Product Line Engineering (MAPLE), San Francisco, CA, USA
1613-0073
1
CemMengi
ChristianFuß
RubenZimmermann
IsmetAktas
conference
2009-mwns-samad-hsvc
Handling Security Vulnerabilities in Clustered Wireless Mesh Networks
2009
5
15
51-62
Print
Shaker Verlag
The 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP NETWORKING 2009, Aachen, Germany.
Aachen, Germany
International Workshop on Mobile and Wireless Networks Security (MWNS 2009)
en
978-3-8322-8177-9
FahadSamad
Sadeq AliMakram
inbook
2008-thissen-LNCS-synergy
Synergy by Integrating New Functionality
2008
519-526
Print
M. Nagl, W. Marquardt
Springer
Lecture Notes in Computer Science 4970
Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support
en
978-3-540-70551-2
SimonBecker
MarkusHeller
MatthiasJarke
WolfgangMarquardt
ManfredNagl
OttoSpaniol
DirkThißen
inproceedings
200707BitschSNFGRatPack
Ratpack: Using Sensor Networks for Animal Observation
2007
7
16
2007-11
95 -- 97
The goal of this project is to describe the behaviour of rats. To study this behaviour, we will resort to the use of wireless sensor networks, monitoring various quantities that yield important information to complement current knowledge on the behavioural repertoire of rats. The challenges we face include data acquisition and processing on the one hand, as rat-borne sensor nodes will need to be small enough not to interfere with the rats' own activities, thus limiting the available memory and processing capabilities. Additionally, rats spend a significant amount of time underground, making data transmission and routing a very interesting challenge, for which we are currently developing novel strategies.
RatPack
fileadmin/papers/2007/2007-07-Bitsch-SNFG-RatPack.pdf
Print
Klaus Wehrle
RWTH Aachen University
Aachen, Germany
AIB
6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Aachen, Germany
GI/ITG Fachgruppe "Kommunikation und Verteilte Systeme"
Aachen, Germany
6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks"
July 16-17, 2007
en
0935-3232
1
Jó AgilaBitsch Link
KlausWehrle
OkuaryOsechas
JohannesThiele
HanspeterMallot
inproceedings
200606LandsiedelRatWatch
Rat Watch: Using Sensor Networks for Animal Observation
2006
6
19
1
1--2
In an attempt to employ sensor network technology for animal observation, in particular of wild rats, we identified several restrictive shortcomings in existing sensor network research, which we discuss in this paper.
(Poster and Abstract)
RatPack
fileadmin/papers/2006/2006-06-Landsiedel-RatWatch.pdf
http://www.sics.se/realwsn06/program.html
Online
Pedro José Marron and Thiemo Voigt
SICS
Uppsala, Sweden
ACM Workshop on Real-World Wireless Sensor Networks (RealWSN) in conjunction with ACM MobiSys, Uppsala, Sweden
ACM
Uppsala, Sweden
ACM Workshop on Real-World Wireless Sensor Networks, REALWSN'06
June 19, 2006
en
1
OlafLandsiedel
Jó AgilaBitsch Link
KlausWehrle
JohannesThiele
HanspeterMallot
inproceedings
200504mongerinformatiktage
Eine strategieorientierte, modulare Simulationsumgebung für mobile Ad-Hoc-Szenarien
2005
Schloss Birlinghoven
Proceedings of GI-Informatiktage 2005
AndreasMonger
StefanieHofmann
JanBronni
MarcelKronfeld
inbook
1999-thissen-springer-management
Dienstmanagement und -vermittlung für Entwicklungswerkzeuge
1999
371-386
Print
M. Nagl, B. Westfechtel
Springer
Integration von Entwicklungssystemen in Ingenieuranwendungen, Substantielle Verbesserung der Entwicklungsprozesse
de
3-540-63920-9
OttoSpaniol
DirkThißen
BerndMeyer
ClaudiaLinnhoff-Popien
article
1997-thissen-IM-corba
Industrieller Einsatz von CORBA: Situation und zukünftige Entwicklungen
Industrie Management
1997
6
Print
de
OttoSpaniol
BerndMeyer
DirkThißen