TY - CHAP U1 - Konferenzveröffentlichung A1 - Niro, Sascha A1 - Lopez Becerra, José Miguel A1 - Westhoff, Dirk A1 - Christ, Andreas T1 - A Keyless Gossip Algorithm Providing Light-Weight Data Privacy for Prosumer Markets T2 - IEEE Ninth International Conference on Self-Adaptive and Self-Organizing Systems workshops, SASOW 2015 N2 - We propose secure multi-party computation techniques for the distributed computation of the average using a privacy-preserving extension of gossip algorithms. While recently there has been mainly research on the side of gossip algorithms (GA) for data aggregation itself, to the best of our knowledge, the aforementioned research line does not take into consideration the privacy of the entities involved. More concretely, it is our objective to not reveal a node's private input value to any other node in the network, while still computing the average in a fully-decentralized fashion. Not revealing in our setting means that an attacker gains only minor advantage when guessing a node's private input value. We precisely quantify an attacker's advantage when guessing - as a mean for the level of data privacy leakage of a node's contribution. Our results show that by perturbing the input values of each participating node with pseudo-random noise with appropriate statistical properties (i) only a minor and configurable leakage of private information is revealed, by at the same time (ii) providing a good average approximation at each node. Our approach can be applied to a decentralized prosumer market, in which participants act as energy consumers or producers or both, referred to as prosumers. KW - Datenmanagement Y1 - 2015 SN - 978-1-4673-8439-1 SB - 978-1-4673-8439-1 U6 - https://dx.doi.org/10.1109/SASOW.2015.10 DO - https://dx.doi.org/10.1109/SASOW.2015.10 SP - 31 EP - 36 ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Mamo, Fesseha Tsegaye A1 - Sikora, Axel T1 - Implementation of Standardized 6LoWPAN Based Application Layer Protocols T2 - 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications N2 - 6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) is gaining more and more attraction for the seamless connectivity of embedded devices for the Internet of Things (IoT). Whereas the lower layers (IEEE802.15.4 and 6LoWPAN) are already well defined and consolidated with regard to frame formats, header compression, routing protocols and commissioning procedures, there is still an abundant choice of possibilities on the application layer. Currently, various groups are working towards standardization of the application layer, i.e. the ETSI Technical Committee on M2M, the IP for Smart Objects (IPSO) Alliance, Lightweight M2M (LWM2M) protocol of the Open Mobile Alliance (OMA), and OneM2M. This multitude of approaches leaves the system developer with the agony of choice. This paper selects, presents and explains one of the promising solutions, discusses its strengths and weaknesses, and demonstrates its implementation. KW - Applikation Y1 - 2015 SN - 978-1-4673-8361-5 (digital) SB - 978-1-4673-8361-5 (digital) SN - 978-1-4673-8359-2 (Print) SB - 978-1-4673-8359-2 (Print) SN - 978-1-4673-8358-5 (CD-ROM) SB - 978-1-4673-8358-5 (CD-ROM) SN - 978-1-4673-8360-8 (USB) SB - 978-1-4673-8360-8 (USB) U6 - https://dx.doi.org/10.1109/IDAACS.2015.7341417 DO - https://dx.doi.org/10.1109/IDAACS.2015.7341417 N1 - Konferenz: IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 24-26 Sept. 2015, Warsaw, Poland SP - 817 EP - 822 ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Schappacher, Manuel A1 - Schmitt, Edgar A1 - Sikora, Axel A1 - Weber, Patrick A1 - Yushev, Artem T1 - A Flexible, Modular, Open-Source Implementation of 6LoWPAN T2 - 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications N2 - 6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) is gaining more and more attraction for the seamless connectivity of embedded devices for the Internet of Things. It can be observed that most of the available solutions are following an open source approach, which significantly leads to a fast development of technologies and of markets. Although the currently available implementations are in a pretty good shape, all of them come with some significant drawbacks. It was therefore decided to start the development of an own implementation, which takes the advantages from the existing solutions, but tries to avoid the drawbacks. This paper discussed the reasoning behind this decision, describes the implementation and its characteristics, as well as the testing results. The given implementation is available as open-source project under [15]. KW - Implementation Y1 - 2015 SN - 978-1-4673-8361-5 (digital) SB - 978-1-4673-8361-5 (digital) SN - 978-1-4673-8359-2 (Print) SB - 978-1-4673-8359-2 (Print) SN - 978-1-4673-8358-5 (CD-ROM) SB - 978-1-4673-8358-5 (CD-ROM) SN - 978-1-4673-8360-8 (USB) SB - 978-1-4673-8360-8 (USB) U6 - https://dx.doi.org/10.1109/IDAACS.2015.7341421 DO - https://dx.doi.org/10.1109/IDAACS.2015.7341421 N1 - Konferenz: IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 24-26 Sept. 2015, Warsaw, Poland SP - 838 EP - 844 ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Serezhina, Maria A1 - Moschevikin, Alex A1 - Evmenchikov, Ruslan A1 - Sikora, Axel T1 - Using Radiating Cable for Time-of-Flight CSS Measurements Indoors and Outdoors T2 - IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) N2 - The application of leaky feeder (radiating) cables is a common solution for the implementation of reliable radio communication in huge industrial buildings, tunnels and mining environment. This paper explores the possibilities of leaky feeders for 1D and 2D localization in wireless systems based on time of flight chirp spread spectrum technologies. The main focus of this paper is to present and analyse the results of time of flight and received signal strength measurements with leaky feeders in indoor and outdoor conditions. The authors carried out experiments to compare ranging accuracy and radio coverage area for a point-like monopole antenna and for a leaky feeder acting as a distributed antenna. In all experiments RealTrac equipment based on nanoLOC radio standard was used. The estimation of the most probable path of a chirp signal going through a leaky feeder was calculated using the ray tracing approach. The typical non-line-of-sight errors profiles are presented. The results show the possibility to use radiating cables in real time location technologies based on time-of-flight method. KW - Kabel KW - Strahl KW - Messtechnik KW - Cascading Style Sheets Y1 - 2015 SN - 978-1-4673-8361-5 (digital) SB - 978-1-4673-8361-5 (digital) SN - 978-1-4673-8359-2 (Print) SB - 978-1-4673-8359-2 (Print) SN - 978-1-4673-8358-5 (CD-ROM) SB - 978-1-4673-8358-5 (CD-ROM) SN - 978-1-4673-8360-8 (USB) SB - 978-1-4673-8360-8 (USB) U6 - https://dx.doi.org/10.1109/IDAACS.2015.7340707 DO - https://dx.doi.org/10.1109/IDAACS.2015.7340707 N1 - Konferenz: IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 24-26 Sept. 2015, Warsaw, Poland SP - 91 EP - 101 ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Yushev, Artem A1 - Walz, Andreas A1 - Sikora, Axel T1 - Securing Embedded Communication with TLS1.2 T2 - embedded world conference 2015, Nuremberg, 24.-26. Feb. 2015 KW - Kommunikation KW - Eingebettetes System Y1 - 2015 UR - https://www.macronix.com/en-us/about/events/Pages/201502002.aspx ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Mamo, Fesseha Tsegaye A1 - Sikora, Axel T1 - Application Protocols for the IPv6-based Internet of Things T2 - Embedded World Conference, Nuremberg, 24.-26. Feb. 2015 KW - Internet der Dinge KW - Applikation Y1 - 2015 VL - 2015 ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Stecklina, Oliver A1 - Kornemann, Stephan A1 - Grehl, Felix A1 - Jung, Ramona A1 - Kranz, Thorsten A1 - Leander, Gregor A1 - Schweer, Dennis A1 - Mollus, Katharina A1 - Westhoff, Dirk T1 - Custom-fit security for efficient and pollution-resistant multicast OTA- programming with fountain codes T2 - 15th International Conference on Innovations for Community Services (I4CS) 2015 KW - Programmierung KW - Quellcode KW - Sicherheit Y1 - 2015 U6 - https://dx.doi.org/10.1109/I4CS.2015.7294492 DO - https://dx.doi.org/10.1109/I4CS.2015.7294492 SP - 1 EP - 7 PB - IEEE ER - TY - JOUR U1 - Zeitschriftenartikel, wissenschaftlich - begutachtet (reviewed) A1 - Nsiah, Kofi Atta A1 - Sikora, Axel A1 - Walz, Andreas A1 - Yushev, Artem T1 - Embedded TLS1.2 Implementation for Smart Metering & Smart Grid Applications JF - Journal of Electronic Science and Technology N2 - Digital networked communications are the key to all Internet-of-Things applications, especially to smart metering systems and the smart grid. In order to ensure a safe operation of systems and the privacy of users, the transport layer security (TLS) protocol, a mature and well standardized solution for secure communications, may be used. We implemented the TLS protocol in its latest version in a way suitable for embedded and resource-constrained systems. This paper outlines the challenges and opportunities of deploying TLS in smart metering and smart grid applications and presents performance results of our TLS implementation. Our analysis shows that given an appropriate implementation and configuration, deploying TLS in constrained smart metering systems is possible with acceptable overhead. KW - Intelligentes Stromnetz KW - Eingebettetes System Y1 - 2015 SN - 1674-862X SS - 1674-862X U6 - https://dx.doi.org/10.11989/JEST.1674-862X.506251 DO - https://dx.doi.org/10.11989/JEST.1674-862X.506251 VL - 13 IS - 4 SP - 373 EP - 378 ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Mohammad, Asif A1 - Stader, Jürgen A1 - Westhoff, Dirk T1 - A privacy-friendly smart metering architecture with few-instance storage T2 - 2015 15th International Conference on Innovations for Community Services (I4CS) N2 - We provide a privacy-friendly cloud-based smart metering storage architecture which provides few-instance storage on encrypted measurements by at the same time allowing SQL queries on them. Our approach is most flexible with respect to two axes: on the one hand it allows to apply filtering rules on encrypted data with respect to various upcoming business cases; on the other hand it provides means for a storage-efficient handling of encrypted measurements by applying server-side deduplication techniques over all incoming smart meter measurements. Although the work at hand is purely dedicated to a smart metering architecture we believe our approach to have value for a broader class of IoT cloud storage solutions. Moreover, it is an example for Privacy-by-design supporting the positive-sum paradigm. KW - Informationstechnik KW - Kommunikation KW - Dienstleistung Y1 - 2015 SN - 978-1-4673-7328-9 (digital) SB - 978-1-4673-7328-9 (digital) SN - 978-1-4673-7327-2 (Print on Demand) SB - 978-1-4673-7327-2 (Print on Demand) U6 - https://dx.doi.org/10.1109/I4CS.2015.7294485 DO - https://dx.doi.org/10.1109/I4CS.2015.7294485 SP - 1 EP - 7 CY - Piscataway ER - TY - CHAP U1 - Konferenzveröffentlichung A1 - Betz, Johann-Wolfram A1 - Westhoff, Dirk ED - Benyoucef, Dirk ED - Freudenberger, Jürgen T1 - CPU-based covert- and side-channels in cloud ecosystems T2 - 2nd Baden-Württemberg Center of Applied Research Symposium on Information and Communication Systems - SInCom 2015 N2 - Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist. KW - cloud computing Y1 - 2015 UR - https://opus.htwg-konstanz.de/frontdoor/deliver/index/docId/444/file/proceedingsSInCom2015.pdf SN - 978-3-00-051859-1 SB - 978-3-00-051859-1 N1 - Konferenz: 2nd Baden-Württemberg Center of Applied Research Symposium on Information and Communication Systems - SInCom 2015 - 13. November 2015 in Konstanz SP - 19 EP - 23 S1 - 5 ER -