Refine
Year of publication
Document Type
- Conference Proceeding (139) (remove)
Conference Type
- Konferenzartikel (137)
- Konferenz-Abstract (1)
- Sonstiges (1)
Language
- English (139) (remove)
Is part of the Bibliography
- yes (139)
Keywords
- Eingebettetes System (5)
- Kommunikation (5)
- Messung (3)
- Security (3)
- Sensortechnik (3)
- cryptography (3)
- Applikation (2)
- Energieversorgung (2)
- Internet der Dinge (2)
- Internet of Things (2)
- MEMS (2)
- Messtechnik (2)
- NB-IoT (2)
- Netzwerk (2)
- Neural networks (2)
- PKI (2)
- Predictive Maintenance (2)
- TLS (2)
- accelerometer (2)
- certificate management (2)
- efficient training (2)
- printed electronics (2)
- security (2)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 6LoWPAN (1)
- AIN Cantilever (1)
- Abbreviate Injury Scale (1)
- Accident Analysis (1)
- Advanced Driver Assistance System (1)
- Android (1)
- Authentication (1)
- Authorization (1)
- Automation (1)
- Automotive engineering (1)
- Bearings (1)
- Blockchain (1)
- Blockchains (1)
- Bussystem (1)
- Car-2-Car communication (1)
- Car-2-X communication (1)
- Car-to-Car-(C2C)-Communication (1)
- Cascading Style Sheets (1)
- Collision Point (1)
- Computerunterstützte Kommunikation (1)
- Cyber Physical Systems, (1)
- Data breech (1)
- Design (1)
- Drahtloses lokales Netz (1)
- EAP-TLS (1)
- ETAP Simulations (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Electronic Commerce (1)
- Embedded AI (1)
- Embedded Software (1)
- Embedded Systems (1)
- Energieverbrauch (1)
- Fahrzeug (1)
- Failure analysis (1)
- Fault Classification (1)
- Federated Learning (1)
- Funktechnik (1)
- Haustechnik (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.11p/WAVE (1)
- IEEE802.15.4 (1)
- IIoT (1)
- Implementation (1)
- Industrial Blockchain (1)
- Industrie 4.0 (1)
- IoT Security (1)
- IoT security (1)
- Kabel (1)
- LPWAN (1)
- Leistung (1)
- Load Flow Analysis (1)
- Long Term Evolution (1)
- Machine learning (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Mobile Computing (1)
- Mobilkommunikation (1)
- Monitoring (1)
- Monte-Carlo method (1)
- NETCONF security (1)
- Network Test (1)
- Niedrige Energie (1)
- OT security (1)
- PROFINET IO (1)
- PROFINET Security (1)
- Performance evaluation (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Power Loss (1)
- Produktion (1)
- RUL (1)
- Radio frequency (1)
- Real-Time Communication (1)
- Sicherheit (1)
- Sicherheitstechnik (1)
- Signaltechnik (1)
- Simulation (1)
- Smart Energy Metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Strahl (1)
- Synchronisation (1)
- System (1)
- TSN security (1)
- TTCN3 (1)
- Target Vehicle (1)
- Testbed (1)
- Testumgebung (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- TinyML (1)
- TinyOS (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Trust management (1)
- Trägheit (1)
- Ultra-Low Energy (1)
- Ultraweitband (1)
- Umwelt (1)
- Unsupervised Learning (1)
- VRU eSafety (1)
- Variational Autoencoders (1)
- Vehicle safety (1)
- Wasser (1)
- Wasserstand (1)
- Wireless IoT (1)
- Wireless M-Bus (1)
- algorithm-based data analysis (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- car2x networks (1)
- cellular radio (1)
- cluster (1)
- computer network management (1)
- credentials (1)
- crossbar (1)
- cybersecurity (1)
- degradation stages (1)
- dickkopf 3 (1)
- e-Mobilität (1)
- embedded systems (1)
- emulation (1)
- fingerprinting (1)
- gyroscope (1)
- hybrid systems (1)
- identification (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- inertial measurement unit (1)
- kabellos (1)
- localization (1)
- machine learning (1)
- machine-to-machine communication (1)
- metal oxide transistor (1)
- model driven design (1)
- mutual authentication (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- primary authentication (1)
- privacy (1)
- radio networks (1)
- real time (1)
- rekeying (1)
- resource efficiency (1)
- secondary surveillance radar (1)
- secure communication (1)
- smart metering (1)
- software defined radio (1)
- sparse backpropagation (1)
- standardization (1)
- subsystem design (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature dependency (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- transmit beamforming (1)
- wide area networks (1)
- Ökologie (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (98)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (82)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (54)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (2)
- Fakultät Medien (M) (ab 22.04.2021) (1)
Open Access
- Closed Access (79)
- Closed (29)
- Open Access (26)
- Bronze (7)
- Diamond (4)
- Gold (1)
Home Care Applications and Ambient Assisted Living become increasingly attractive. This is caused as well by market pull, as the number of elderly people grows monotonously, as well as by technology push, as technological advances and attractive products pave the way to economically advantageous offerings. However, in real-life applications, a significant number of challenges remain. Those include seamless communication between products from different supplier, due to the lack of sufficiently standardized solutions, energy budgets, and scalability of solutions. This paper presents the experience from the InCASA project (Integrated Network for Completely Assisted Senior Citizen's Autonomy), where architectures for heterogeneous physical and logical communication flows are examined.
A novel approach of a test environment for embedded networking nodes has been conceptualized and implemented. Its basis is the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes run in parallel, connected via so-called virtual channels. The environment allows to modifying the behavior of the virtual channels as well as the overall topology during runtime to virtualize real-life networking scenarios. The presented approach is very efficient and allows a simple description of test cases without the need of a network simulator. Furthermore, it speeds up the process of developing new features as well as it supports the identification of bugs in wireless communication stacks. In combination with powerful test execution systems, it is possible to create a continuous development and integration flow.
The application of leaky feeder (radiating) cables is a common solution for the implementation of reliable radio communication in huge industrial buildings, tunnels and mining environment. This paper explores the possibilities of leaky feeders for 1D and 2D localization in wireless systems based on time of flight chirp spread spectrum technologies. The main focus of this paper is to present and analyse the results of time of flight and received signal strength measurements with leaky feeders in indoor and outdoor conditions. The authors carried out experiments to compare ranging accuracy and radio coverage area for a point-like monopole antenna and for a leaky feeder acting as a distributed antenna. In all experiments RealTrac equipment based on nanoLOC radio standard was used. The estimation of the most probable path of a chirp signal going through a leaky feeder was calculated using the ray tracing approach. The typical non-line-of-sight errors profiles are presented. The results show the possibility to use radiating cables in real time location technologies based on time-of-flight method.
In this work, we consider a duty-cycled wireless sensor network with the assumption that the on/off schedules are uncoordinated. In such networks, as all nodes may not be awake during the transmission of time synchronization messages, nodes will require to re-transmit the synchronization messages. Ideally a node should re-transmit for the maximum sleep duration to ensure that all nodes are synchronized. However, such a proposition will immensely increase the energy consumption of the nodes. Such a situation demands that there is an upper bound of the number of retransmissions. We refer to the time a node spends in re-transmission of the control message as broadcast duration. We ask the question, what should be the broadcast duration to ensure that a certain percentage of the available nodes are synchronized. The problem to estimate the broadcast duration is formulated so as to capture the probability threshold of the nodes being synchronized. Results show the proposed analytical model can predict the broadcast duration with a given lower error margin under real world conditions, thus demonstrating the efficiency of our solution.
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness.
Towards a Formal Verification of Seamless Cryptographic Rekeying in Real-Time Communication Systems
(2022)
This paper makes two contributions to the verification of communication protocols by transition systems. Firstly, the paper presents a modeling of a cyclic communication protocol using a synchronized network of transition systems. This protocol enables seamless cryptographic rekeying embedded into cyclic messages. Secondly, we test the protocol using the model checking verification technique.