Refine
Year of publication
Document Type
- Conference Proceeding (145)
- Article (reviewed) (28)
- Article (unreviewed) (19)
- Part of a Book (11)
- Patent (3)
- Report (3)
- Contribution to a Periodical (1)
Conference Type
- Konferenzartikel (143)
- Konferenz-Abstract (1)
- Sonstiges (1)
Is part of the Bibliography
- yes (210)
Keywords
- Kommunikation (11)
- Eingebettetes System (8)
- Blockchain (6)
- Sicherheit (5)
- Intelligentes Stromnetz (4)
- Internet of Things (4)
- Security (4)
- blockchain (4)
- Energieversorgung (3)
- IIoT (3)
- IoT security (3)
- Messung (3)
- Sensortechnik (3)
- cryptography (3)
- security (3)
- Applikation (2)
- Bearings (2)
- Blockchains (2)
- Drahtloses lokales Netz (2)
- IT-Sicherheit (2)
- Industrie 4.0 (2)
- Internet (2)
- Internet der Dinge (2)
- MEMS (2)
- Messtechnik (2)
- Monitoring (2)
- NB-IoT (2)
- Netzwerk (2)
- Neural networks (2)
- Niedrige Energie (2)
- PKI (2)
- PUF key generation (2)
- Predictive Maintenance (2)
- Predictive maintenance (2)
- Scalability (2)
- Sicherheitstechnik (2)
- TLS (2)
- accelerometer (2)
- certificate management (2)
- efficient training (2)
- machine learning (2)
- physical unclonable function (2)
- physically unclonable function (PUF) (2)
- predictive maintenance (2)
- printed electronics (2)
- resource efficiency (2)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 6LoWPAN (1)
- AIN Cantilever (1)
- Abbreviate Injury Scale (1)
- Accident Analysis (1)
- Advanced Driver Assistance System (1)
- Android (1)
- Aurikuläre Stimulation (1)
- Authentication (1)
- Authorization (1)
- Automation (1)
- Automatisierungssystem (1)
- Automatisierungstechnik (1)
- Automotive engineering (1)
- BACnet (1)
- Bearing fault classification (1)
- Blockchain-to-Blockchain communication (1)
- Bussystem (1)
- CIoT (1)
- Car-2-Car communication (1)
- Car-2-X communication (1)
- Car-to-Car-(C2C)-Communication (1)
- Cascading Style Sheets (1)
- Cellular networks (1)
- Cloud computing (1)
- Cloud storage (1)
- Collision Point (1)
- Communication (1)
- Computerunterstützte Kommunikation (1)
- Cyber Physical Systems, (1)
- Data breech (1)
- Deep learning (1)
- Design (1)
- Digitaltechnik (1)
- Dissens (1)
- EAP-TLS (1)
- ETAP Simulations (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Effizienz (1)
- Electronic Commerce (1)
- Elektroden-Interface (1)
- Embedded AI (1)
- Embedded Software (1)
- Embedded Systems (1)
- Energieverbrauch (1)
- Entropie (1)
- Entropy (1)
- Fahrzeug (1)
- Failure analysis (1)
- Fault Classification (1)
- Fault classification (1)
- Federated Learning (1)
- Feldbus (1)
- Field-programmable gate array (FPGA) (1)
- Flugdatenregistriergerät (1)
- Funktechnik (1)
- GPRS (1)
- Gateway (1)
- Gebäudeleittechnik (1)
- Grinding machines (1)
- Gruppe (1)
- Halbleitertechnologie (1)
- Haustechnik (1)
- Heuristic algorithms (1)
- Higher Education (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.11p/WAVE (1)
- IEEE802.15.4 (1)
- Implementation (1)
- Industrial Blockchain (1)
- Industrial internet of things (1)
- Industry 4.0 (1)
- Industry Use cases (1)
- Industry automation (1)
- Integrierte Schaltung (1)
- Intelligenter Zähler (1)
- Intermediate domain (1)
- Interoperability (1)
- IoT Security (1)
- Java <Programmiersprache> (1)
- Jitter (1)
- Kabel (1)
- Kommunikationsprotokoll (1)
- Kommunikationssystem (1)
- LPWAN (1)
- Leistung (1)
- Load Flow Analysis (1)
- Lokalisation (1)
- Long Term Evolution (1)
- Low-latency (1)
- Machine learning (1)
- Machine-learning (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Maschine (1)
- Mobile Computing (1)
- Mobilkommunikation (1)
- Monte-Carlo method (1)
- NETCONF security (1)
- Network Test (1)
- Noise measurement (1)
- OT security (1)
- PROFINET IO (1)
- PROFINET Security (1)
- Particle swarm optimization (1)
- Patient (1)
- Performance evaluation (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Power Loss (1)
- Produktion (1)
- Prozessor (1)
- Qualität (1)
- RUL (1)
- Radio frequency (1)
- Real-Time Communication (1)
- Reinforcement learning (1)
- Remaining useful life (1)
- Rundfunk (1)
- Schaltwerk (1)
- Sequenzielle Schaltung (1)
- Signaltechnik (1)
- Simulation (1)
- Smart Energy Metering (1)
- Smart Grid (1)
- Smart Metering (1)
- Smart metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Software (1)
- Sprachgebrauch (1)
- Strahl (1)
- Synchronisation (1)
- System (1)
- TSN security (1)
- TTCN3 (1)
- Target Vehicle (1)
- Terrestrisches Laserscanning (1)
- Testbed (1)
- Testumgebung (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- TinyML (1)
- TinyOS (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transfer learning (1)
- Trust management (1)
- Trägheit (1)
- UMTS (1)
- URLLC (1)
- Ultra-Low Energy (1)
- Ultraweitband (1)
- Umwelt (1)
- Unsupervised Learning (1)
- V2X (1)
- VANET (1)
- VRU eSafety (1)
- Variational Autoencoders (1)
- Vehicle safety (1)
- Versorgungstechnik (1)
- Verteilung (1)
- Voltage measurement (1)
- Wasser (1)
- Wasserstand (1)
- Wireless Body Area Networks (1)
- Wireless IoT (1)
- Wireless M-Bus (1)
- algorithm-based data analysis (1)
- analog physical unclonable function system (1)
- authentication (1)
- authorization (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- blockchain-based system (1)
- car2x networks (1)
- cellular radio (1)
- cluster (1)
- compression (1)
- computer network management (1)
- credentials (1)
- crossbar (1)
- cybersecurity (1)
- degradation stages (1)
- dickkopf 3 (1)
- distributed ledger (1)
- e-Mobilität (1)
- eingebettetes System (1)
- embedded systems (1)
- emulation (1)
- fingerprinting (1)
- game theory (1)
- gossip protocol (1)
- gyroscope (1)
- hybrid networks (1)
- hybrid systems (1)
- identification (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- inertial measurement unit (1)
- integer linear programming (1)
- intermediate domain (1)
- kabellos (1)
- legacy machines (1)
- lifelong learning (1)
- localization (1)
- low-cost sensors and devices (1)
- machine-to-machine communication (1)
- maintenance (1)
- manufacturing industries (1)
- metal oxide transistor (1)
- model driven design (1)
- mutual authentication (1)
- network optimization (1)
- peer-to-peer (1)
- performance (1)
- primary authentication (1)
- privacy (1)
- quality feedback survey and results assessment (1)
- radio networks (1)
- real time (1)
- real-time systems (1)
- rekeying (1)
- remaining useful life (1)
- scalability (1)
- secondary surveillance radar (1)
- secure communication (1)
- security keys (1)
- sensor and actuator networks (1)
- sharding algorithm (1)
- shop floor (1)
- smart metering (1)
- software defined radio (1)
- sparse backpropagation (1)
- standardization (1)
- storage efficiency (1)
- storage optimization (1)
- subsystem design (1)
- summarization (1)
- syndrome coding (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature dependency (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- topology (1)
- transfer learning (1)
- transmit beamforming (1)
- trust management (1)
- trust management system (1)
- unique interdisciplinary international higher education approach (1)
- wide area networks (1)
- Ökologie (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (134)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (120)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (85)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (3)
- Fakultät Medien (M) (ab 22.04.2021) (1)
- Zentrale Einrichtungen (1)
Open Access
- Closed Access (93)
- Open Access (59)
- Closed (38)
- Bronze (13)
- Gold (8)
- Diamond (4)
Die Erfindung betrifft ein Verfahren zum Maximieren der von einer analogen Entropiequelle abgeleiteten Entropie, wobei das Verfahren folgende Schritte aufweist:- Bereitstellen von Eingabedaten für die analoge Entropiequelle (2);- Erzeugen von Rückgabewerten durch die analoge Entropiequelle basierend auf den Eingabedaten (3); und- Gruppieren der Rückgabewerte, wobei das Gruppieren der Rückgabewerte ein Anwenden von Versätzen auf Rückgabewerte aufweist (4).
The application of leaky feeder (radiating) cables is a common solution for the implementation of reliable radio communication in huge industrial buildings, tunnels and mining environment. This paper explores the possibilities of leaky feeders for 1D and 2D localization in wireless systems based on time of flight chirp spread spectrum technologies. The main focus of this paper is to present and analyse the results of time of flight and received signal strength measurements with leaky feeders in indoor and outdoor conditions. The authors carried out experiments to compare ranging accuracy and radio coverage area for a point-like monopole antenna and for a leaky feeder acting as a distributed antenna. In all experiments RealTrac equipment based on nanoLOC radio standard was used. The estimation of the most probable path of a chirp signal going through a leaky feeder was calculated using the ray tracing approach. The typical non-line-of-sight errors profiles are presented. The results show the possibility to use radiating cables in real time location technologies based on time-of-flight method.
In this work, we consider a duty-cycled wireless sensor network with the assumption that the on/off schedules are uncoordinated. In such networks, as all nodes may not be awake during the transmission of time synchronization messages, nodes will require to re-transmit the synchronization messages. Ideally a node should re-transmit for the maximum sleep duration to ensure that all nodes are synchronized. However, such a proposition will immensely increase the energy consumption of the nodes. Such a situation demands that there is an upper bound of the number of retransmissions. We refer to the time a node spends in re-transmission of the control message as broadcast duration. We ask the question, what should be the broadcast duration to ensure that a certain percentage of the available nodes are synchronized. The problem to estimate the broadcast duration is formulated so as to capture the probability threshold of the nodes being synchronized. Results show the proposed analytical model can predict the broadcast duration with a given lower error margin under real world conditions, thus demonstrating the efficiency of our solution.
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness.
Deep learning approaches are becoming increasingly important for the estimation of the Remaining Useful Life (RUL) of mechanical elements such as bearings. This paper proposes and evaluates a novel transfer learning-based approach for RUL estimations of different bearing types with small datasets and low sampling rates. The approach is based on an intermediate domain that abstracts features of the bearings based on their fault frequencies. The features are processed by convolutional layers. Finally, the RUL estimation is performed using a Long Short-Term Memory (LSTM) network. The transfer learning relies on a fixed-feature extraction. This novel deep learning approach successfully uses data of a low-frequency range, which is a precondition to use low-cost sensors. It is validated against the IEEE PHM 2012 Data Challenge, where it outperforms the winning approach. The results show its suitability for low-frequency sensor data and for efficient and effective transfer learning between different bearing types.
Towards a Formal Verification of Seamless Cryptographic Rekeying in Real-Time Communication Systems
(2022)
This paper makes two contributions to the verification of communication protocols by transition systems. Firstly, the paper presents a modeling of a cyclic communication protocol using a synchronized network of transition systems. This protocol enables seamless cryptographic rekeying embedded into cyclic messages. Secondly, we test the protocol using the model checking verification technique.
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.