Refine
Year of publication
Document Type
- Conference Proceeding (113) (remove)
Conference Type
- Konferenzartikel (112)
- Konferenzband (1)
Keywords
- Eingebettetes System (5)
- Kommunikation (4)
- cryptography (3)
- Applikation (2)
- Blockchain (2)
- Internet der Dinge (2)
- MEMS (2)
- Machine learning (2)
- Messtechnik (2)
- Netzwerk (2)
- Neural networks (2)
- Predictive Maintenance (2)
- Security (2)
- Sensortechnik (2)
- accelerometer (2)
- certificate management (2)
- efficient training (2)
- printed electronics (2)
- 5G (1)
- 5G mobile communication (1)
- 6LoWPAN (1)
- AIN Cantilever (1)
- Authentication (1)
- Authorization (1)
- Bearings (1)
- Binary Executable (1)
- Blockchains (1)
- Car-to-Car-(C2C)-Communication (1)
- Cascading Style Sheets (1)
- Cloud computing (1)
- Cyber Physical Systems, (1)
- Cybersecurity (1)
- Data breech (1)
- Datenmanagement (1)
- Deep Learning (1)
- Design (1)
- Dienstleistung (1)
- EAP-TLS (1)
- ETAP Simulations (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Embedded AI (1)
- Embedded Systems (1)
- Energieverbrauch (1)
- Failure analysis (1)
- Fault Classification (1)
- Federated Learning (1)
- Funktechnik (1)
- Gebäudeleittechnik (1)
- Haustechnik (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- IIoT (1)
- Implementation (1)
- Industrial Blockchain (1)
- Industrie 4.0 (1)
- Informationstechnik (1)
- Informationsvermittlung (1)
- Internet of Things (1)
- IoT Security (1)
- IoT security (1)
- Kabel (1)
- Kryoptologie (1)
- LPWAN (1)
- Leistung (1)
- Load Flow Analysis (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Messung (1)
- Mikroelektronik (1)
- Mobilkommunikation (1)
- Monitoring (1)
- Monte-Carlo method (1)
- NB-IoT (1)
- NETCONF security (1)
- Network Test (1)
- Niedrige Energie (1)
- OT security (1)
- PKI (1)
- PROFINET IO (1)
- PROFINET Security (1)
- Performance evaluation (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Poisoning (1)
- Power Loss (1)
- Programmierung (1)
- Quellcode (1)
- RUL (1)
- Radio frequency (1)
- Real-Time Communication (1)
- Sicherheit (1)
- Signaltechnik (1)
- Simulation (1)
- Smart Energy Metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Strahl (1)
- Synchronisation (1)
- TLS (1)
- TSN security (1)
- TTCN3 (1)
- Testbed (1)
- Testumgebung (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- TinyML (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Trust management (1)
- Ultra-Low Energy (1)
- Ultraweitband (1)
- Unsupervised Learning (1)
- Variational Autoencoders (1)
- Verifiability (1)
- Wasserstand (1)
- Wireless IoT (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- cloud computing (1)
- cluster (1)
- credentials (1)
- crossbar (1)
- cybersecurity (1)
- degradation stages (1)
- eingebettetes Gerät (1)
- embedded systems (1)
- fingerprinting (1)
- gyroscope (1)
- hybrid systems (1)
- identification (1)
- industrial Ethernet (1)
- industrial communication (1)
- inertial measurement unit (1)
- kabellos (1)
- machine learning (1)
- metal oxide transistor (1)
- mutual authentication (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- primary authentication (1)
- rekeying (1)
- resource efficiency (1)
- secure communication (1)
- security (1)
- softwaregenerierter Code (1)
- sparse backpropagation (1)
- system authenticity (1)
- temperature dependency (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- Ökologie (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (113) (remove)
Open Access
- Closed Access (67)
- Closed (21)
- Open Access (19)
- Diamond (4)
- Bronze (3)
- Gold (1)
Die Vielfalt der Protokolle, die praktisch auf allen Ebenen der Netzwerkkommunikation zu berücksichtigen ist, stellt eine der großen Herausforderungen bei der fortschreitenden Automatisierung des intelligenten Hauses dar. Unter dem Überbegriff Internet der Dinge (Internet of Things) entstehen gegenwärtig zahlreiche neue Entwicklungen, Standards, Allianzen und so genannte Ökosysteme. Diese haben die Absicht einer horizontalen Integration gewerkeübergreifender Anwendungen und verfolgen fast alle das Ziel, die Situation zu vereinfachen, die Entwicklungen zu beschleunigen und Markterfolge zu erreichen. Leider macht diese Vielfalt momentan die Welt aber eher noch komplexer und bringt damit das Risiko mit sich, genau das Gegenteil der ursprünglichen Absichten zu erreichen. Dieser Beitrag versucht, die Entwicklungen möglichst systematisch zu kategorisieren und mögliche Lösungsansätze zu beschreiben.
A novel approach of a test environment for embedded networking nodes has been conceptualized and implemented. Its basis is the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes run in parallel, connected via so-called virtual channels. The environment allows to modifying the behavior of the virtual channels as well as the overall topology during runtime to virtualize real-life networking scenarios. The presented approach is very efficient and allows a simple description of test cases without the need of a network simulator. Furthermore, it speeds up the process of developing new features as well as it supports the identification of bugs in wireless communication stacks. In combination with powerful test execution systems, it is possible to create a continuous development and integration flow.
The importance of machine learning (ML) has been increasing dramatically for years. From assistance systems to production optimisation to healthcare support, almost every area of daily life and industry is coming into contact with machine learning. Besides all the benefits ML brings, the lack of transparency and difficulty in creating traceability pose major risks. While solutions exist to make the training of machine learning models more transparent, traceability is still a major challenge. Ensuring the identity of a model is another challenge, as unnoticed modification of a model is also a danger when using ML. This paper proposes to create an ML Birth Certificate and ML Family Tree secured by blockchain technology. Important information about training and changes to the model through retraining can be stored in a blockchain and accessed by any user to create more security and traceability about an ML model.
The application of leaky feeder (radiating) cables is a common solution for the implementation of reliable radio communication in huge industrial buildings, tunnels and mining environment. This paper explores the possibilities of leaky feeders for 1D and 2D localization in wireless systems based on time of flight chirp spread spectrum technologies. The main focus of this paper is to present and analyse the results of time of flight and received signal strength measurements with leaky feeders in indoor and outdoor conditions. The authors carried out experiments to compare ranging accuracy and radio coverage area for a point-like monopole antenna and for a leaky feeder acting as a distributed antenna. In all experiments RealTrac equipment based on nanoLOC radio standard was used. The estimation of the most probable path of a chirp signal going through a leaky feeder was calculated using the ray tracing approach. The typical non-line-of-sight errors profiles are presented. The results show the possibility to use radiating cables in real time location technologies based on time-of-flight method.
In this work, we consider a duty-cycled wireless sensor network with the assumption that the on/off schedules are uncoordinated. In such networks, as all nodes may not be awake during the transmission of time synchronization messages, nodes will require to re-transmit the synchronization messages. Ideally a node should re-transmit for the maximum sleep duration to ensure that all nodes are synchronized. However, such a proposition will immensely increase the energy consumption of the nodes. Such a situation demands that there is an upper bound of the number of retransmissions. We refer to the time a node spends in re-transmission of the control message as broadcast duration. We ask the question, what should be the broadcast duration to ensure that a certain percentage of the available nodes are synchronized. The problem to estimate the broadcast duration is formulated so as to capture the probability threshold of the nodes being synchronized. Results show the proposed analytical model can predict the broadcast duration with a given lower error margin under real world conditions, thus demonstrating the efficiency of our solution.
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness.
Towards a Formal Verification of Seamless Cryptographic Rekeying in Real-Time Communication Systems
(2022)
This paper makes two contributions to the verification of communication protocols by transition systems. Firstly, the paper presents a modeling of a cyclic communication protocol using a synchronized network of transition systems. This protocol enables seamless cryptographic rekeying embedded into cyclic messages. Secondly, we test the protocol using the model checking verification technique.