This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2023-09-24
Creation time: 22-56-15
--- Number of references
15
inproceedings
2021_kiesel_5g
Development of a Model to Evaluate the Potential of 5G Technology for Latency-Critical Applications in Production
2021
12
15
739-744
Latency-critical applications in production promise to be essential enablers for performance improvement in production. However, they require the right and often wireless communication system. 5G technology appears to be an effective way to achieve communication system for these applications. Its estimated economic benefit on production gross domestic product is immense ($740 billion Euro until 2030). However, 55% of production companies state that 5G technology deployment is currently not a subject matter for them and mainly state the lack of knowledge on benefits as a reason. Currently, it is missing an approach or model for a use case specific, data-based evaluation of 5G technology influence on the performance of production applications. Therefore, this paper presents a model to evaluate the potential of 5G technology for latency-critical applications in production. First, we derive requirements for the model to fulfill the decision-makers' needs. Second, we analyze existing evaluation approaches regarding their fulfillment of the derived requirements. Third, based on outlined research gaps, we develop a model fulfilling the requirements. Fourth, we give an outlook for further research needs.
5G technology; latency-critical applications; production; evaluation model
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kiesel-5g-model.pdf
IEEE
Proceedings of the 28th IEEE International Conference on Industrial Engineering and Engineering Management (IEEM '21), December 13-16, 2021, Singapore, Singapore
Singapore, Singapore
December 13-16, 2021
978-1-6654-3771-4
10.1109/IEEM50564.2021.9673074
1
RaphaelKiesel
FalkBoehm
JanPennekamp
Robert H.Schmitt
inproceedings
2021-krude-nfp-pred
Determination of Throughput Guarantees for Processor-based SmartNICs
2021
12
7
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-krude-nfp-pred.pdf
ACM
The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21)
978-1-4503-9098-9/21/12
10.1145/3485983.3494842
1
JohannesKrude
JanRüth
DanielSchemmel
FelixRath
Iohannes-HeorhFolbort
KlausWehrle
inproceedings
2021-kunze-spin-tracker
Tracking the QUIC Spin Bit on Tofino
2021
12
7
15–21
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-spin-tracker.pdf
ACM
Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ '21)
9781450391351
10.1145/3488660.3493804
1
IkeKunze
ConstantinSander
KlausWehrle
JanRüth
inproceedings
2021_pennekamp_bootstrapping
Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships
2021
11
15
RWTH-2021-09499
In addition to quality improvements and cost reductions, dynamic and flexible business relationships are expected to become more important in the future to account for specific customer change requests or small-batch production. Today, despite reservation, sensitive information must be shared upfront between buyers and sellers. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness following information leaks or breaches of their privacy. To address this issue, the concepts of confidential computing and cloud computing come to mind as they promise to offer scalable approaches that preserve the privacy of participating companies. In particular, designs building on confidential computing can help to technically enforce privacy. Moreover, cloud computing constitutes an elegant design choice to scale these novel protocols to industry needs while limiting the setup and management overhead for practitioners. Thus, novel approaches in this area can advance the status quo of bootstrapping new relationships as they provide privacy-preserving alternatives that are suitable for immediate deployment.
bootstrapping procurement; business relationships; secure industrial collaboration; privacy; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-bootstrapping.pdf
RWTH Aachen University
Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea
RWTH Aachen University
Seoul, Korea
November 14, 2021
10.18154/RWTH-2021-09499
JanPennekamp
FrederikFuhrmann
MarkusDahlmanns
TimoHeutmann
AlexanderKreppein
DennisGrunert
ChristophLange
Robert H.Schmitt
KlausWehrle
inproceedings
2021-sander-shardingrevisited
Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?
2021
11
2
legato
/fileadmin/papers/2021/2021-sander-sharding-revisited.pdf
ACM
Proceedings of the Internet Measurement Conference (IMC '21)
Internet Measurement Conference 2021
02.11.21 - 04.11.21
978-1-4503-9129-0/21/11
10.1145/3487552.3487832
1
ConstantinSander
LeoBlöcher
KlausWehrle
JanRüth
proceedings
fink-lcn-demons-2021
DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps
2021
10
4
nerd-nrw
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-fink-lcn-demons.pdf
IEEE
online
Edmonton, Canada
46th IEEE Conference on Local Computer Networks (LCN)
October 4-7, 2021
10.1109/LCN52139.2021.9524879
1
Ina BereniceFink
MartinSerror
KlausWehrle
inproceedings
2021-glebke-service-based-forwarding
Service-based Forwarding via Programmable Dataplanes
2021
6
10
reflexes
/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf
IEEE
Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)
978-1-6654-4005-9
2325-5609
10.1109/HPSR52026.2021.9481814
1
RenéGlebke
DirkTrossen
IkeKunze
DavidLou
JanRüth
MirkoStoffers
KlausWehrle
inproceedings
2021-kunze-coordinate-transformation
Investigating the Applicability of In-Network Computing to Industrial Scenarios
2021
5
11
334-340
in-network computing; latency; approximation
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf
IEEE
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21)
978-1-7281-6207-2
10.1109/ICPS49255.2021.9468247
1
IkeKunze
RenéGlebke
JanScheiper
MatthiasBodenbenner
Robert H.Schmitt
KlausWehrle
article
2021_buckhorst_lmas
Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production
Procedia CIRP
2021
5
3
99
448-453
Assembly systems must provide maximum flexibility qualified by organization and technology to offer cost-compliant performance features to differentiate themselves from competitors in buyers' markets. By mobilization of multipurpose resources and dynamic planning, Line-less Mobile Assembly Systems (LMASs) offer organizational reconfigurability. By proposing a holarchy to combine LMASs with the concept of an Internet of Production (IoP), we enable LMASs to source valuable information from cross-level production networks, physical resources, software nodes, and data stores that are interconnected in an IoP. The presented holarchy provides a concept of how to address future challenges, meet the requirements of shorter lead times, and unique lifecycle support. The paper suggests an application of decision making, distributed sensor services, recommender-based data reduction, and in-network computing while considering safety and human usability alike.
Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME '20), July 14-17, 2020, Gulf of Naples, Italy
Internet of Production; Line-less Mobile Assembly System; Industrial Assembly; Smart Factory
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-buckhorst-holarchy.pdf
Elsevier
Gulf of Naples, Italy
July 14-17, 2020
2212-8271
10.1016/j.procir.2021.03.064
1
Armin F.Buckhorst
BenjaminMontavon
DominikWolfschläger
MelanieBuchsbaum
AmirShahidi
HenningPetruck
IkeKunze
JanPennekamp
ChristianBrecher
MathiasHüsing
BurkhardCorves
VerenaNitsch
KlausWehrle
Robert H.Schmitt
inproceedings
2021-kunze-aqm-tofino-p4
Tofino + P4: A Strong Compound for AQM on High-Speed Networks?
2021
5
72-80
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf
IFIP/IEEE
Proceedings of the International Symposium on Integrated Network Management (IM '21)
Virtual Event
International Symposium on Integrated Network Management (IM '21)
May 2021
978-1-7281-9041-9
1
IkeKunze
MoritzGunz
DavidSaam
KlausWehrle
JanRüth
inproceedings
2021_dahlmanns_entrust
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
2021
4
28
78–87
The ongoing digitization of industrial manufacturing leads to a decisive change in industrial communication paradigms. Moving from traditional one-to-one to many-to-many communication, publish/subscribe systems promise a more dynamic and efficient exchange of data. However, the resulting significantly more complex communication relationships render traditional end-to-end security futile for sufficiently protecting the sensitive and safety-critical data transmitted in industrial systems. Most notably, the central message brokers inherent in publish/subscribe systems introduce a designated weak spot for security as they can access all communication messages. To address this issue, we propose ENTRUST, a novel solution for key server-based end-to-end security in publish/subscribe systems. ENTRUST transparently realizes confidentiality, integrity, and authentication for publish/subscribe systems without any modification of the underlying protocol. We exemplarily implement ENTRUST on top of MQTT, the de-facto standard for machine-to-machine communication, showing that ENTRUST can integrate seamlessly into existing publish/subscribe systems.
cyber-physical system security; publish-subscribe security; end-to-end security
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-dahlmanns-entrust.pdf
ACM
Proceedings of the 1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS '21), co-located with the 11th ACM Conference on Data and Application Security and Privacy (CODASPY '21), April 26-28, 2021, Virtual Event, USA
Virtual Event, USA
ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
April 28, 2021
978-1-4503-8319-6/21/04
10.1145/3445969.3450423
1
MarkusDahlmanns
JanPennekamp
Ina BereniceFink
BerndSchoolmann
KlausWehrle
MartinHenze
inproceedings
2021-sander-zoom-cc
Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM
2021
3
internet-of-production
/fileadmin/papers/2021/2021-sander-zoom-fairness-aqm.pdf
https://arxiv.org/abs/2107.00904
Springer
Proceedings of the Passive and Active Measurement Conference (PAM '21)
Passive and Active Measurement Conference (PAM 2021)
10.1007/978-3-030-72582-2_1
1
ConstantinSander
IkeKunze
KlausWehrle
JanRüth
phdthesis
2021-serror-phd-thesis
On the Benefits of Cooperation for Dependable Wireless Communications
2021
3
https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-7923-4
Shaker Verlag
Shaker Verlag, Düren, Germany
Reports on Communications and Distributed Systems
21
RWTH Aachen University
Ph.D. Thesis
978-3-8440-7923-4
MartinSerror
article
2021_schomakers_insights
Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives
Computer Law Review International
2021
2
15
22
1
8-15
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity, Privacy, European Data Protection Law
1610-7608
10.9785/cri-2021-220103
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle
inproceedings
2019_rut_schomakers_privacy
Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity
2021
1
27
857-870
Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to "special categories" of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as "potentially sensitive." The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments.
Information Sensitivity,Privacy,European Data Protection Law
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf
https://dl.gi.de/handle/20.500.12116/34788
https://arxiv.org/abs/1911.06569
Gesellschaft für Informatik
Bonn
INFORMATIK 2020
Karlsruhe, Germany
INFORMATIK 2020
2020-09-28 to 2020-10-01
English
10.18420/inf2020_76
1
Eva-MariaSchomakers
ChantalLidynia
DirkMüllmann
RomanMatzutt
KlausWehrle
IndraSpiecker gen. Döhmann
MartinaZiefle