Refine
Year of publication
Document Type
- Conference Proceeding (28)
- Article (reviewed) (16)
- Article (unreviewed) (11)
- Patent (3)
- Contribution to a Periodical (1)
Conference Type
- Konferenzartikel (26)
- Konferenz-Abstract (1)
- Sonstiges (1)
Is part of the Bibliography
- yes (59)
Keywords
- Blockchain (5)
- blockchain (4)
- Internet of Things (3)
- Eingebettetes System (2)
- Energieversorgung (2)
- IIoT (2)
- IT-Sicherheit (2)
- Intelligentes Stromnetz (2)
- Kommunikation (2)
- Neural networks (2)
- Scalability (2)
- Security (2)
- Sensortechnik (2)
- Sicherheit (2)
- Sicherheitstechnik (2)
- efficient training (2)
- machine learning (2)
- 5G (1)
- Android (1)
- Aurikuläre Stimulation (1)
- Automation (1)
- Automotive engineering (1)
- Blockchain-to-Blockchain communication (1)
- Blockchains (1)
- CIoT (1)
- Car-to-Car-(C2C)-Communication (1)
- Cellular networks (1)
- Cloud computing (1)
- Cloud storage (1)
- Communication (1)
- Cyber Physical Systems, (1)
- Deep learning (1)
- Edge AI (1)
- Elektroden-Interface (1)
- Embedded AI (1)
- Embedded Software (1)
- Embedded Systems (1)
- Entropie (1)
- Fahrzeug (1)
- Federated Learning (1)
- Feldbus (1)
- Heuristic algorithms (1)
- Higher Education (1)
- Industrial internet of things (1)
- Industrie 4.0 (1)
- Industry 4.0 (1)
- Industry automation (1)
- Internet der Dinge (1)
- Interoperability (1)
- IoT security (1)
- LPWAN (1)
- Low-latency (1)
- MEMS (1)
- Machine learning (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Monitoring (1)
- NB-IoT (1)
- Network Test (1)
- Netzwerk (1)
- Niedrige Energie (1)
- PUF key generation (1)
- Particle swarm optimization (1)
- Patient (1)
- Predictive Maintenance (1)
- Produktion (1)
- Prozessor (1)
- Reinforcement learning (1)
- Simulation (1)
- Smart Grid (1)
- Smart Metering (1)
- TLS (1)
- TTCN3 (1)
- Testumgebung (1)
- TinyML (1)
- Traceability (1)
- URLLC (1)
- Umwelt (1)
- Unsupervised Learning (1)
- V2X (1)
- VANET (1)
- Variational Autoencoders (1)
- Vehicle safety (1)
- Wasserstand (1)
- Wireless Body Area Networks (1)
- accelerometer (1)
- algorithm-based data analysis (1)
- analog physical unclonable function system (1)
- authentication (1)
- authorization (1)
- benchmarking (1)
- blockchain-based system (1)
- cluster (1)
- compression (1)
- cryptography (1)
- cybersecurity (1)
- dickkopf 3 (1)
- distributed ledger (1)
- eingebettetes System (1)
- game theory (1)
- gossip protocol (1)
- gyroscope (1)
- inertial measurement unit (1)
- integer linear programming (1)
- intermediate domain (1)
- legacy machines (1)
- lifelong learning (1)
- maintenance (1)
- manufacturing industries (1)
- network optimization (1)
- peer-to-peer (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- quality feedback survey and results assessment (1)
- remaining useful life (1)
- resource efficiency (1)
- scalability (1)
- security (1)
- security keys (1)
- sharding algorithm (1)
- shop floor (1)
- sparse backpropagation (1)
- storage efficiency (1)
- storage optimization (1)
- summarization (1)
- syndrome coding (1)
- temperature dependency (1)
- topology (1)
- transfer learning (1)
- trust management (1)
- trust management system (1)
- unique interdisciplinary international higher education approach (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (35)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (33)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (24)
- Fakultät Medien (M) (ab 22.04.2021) (1)
- Zentrale Einrichtungen (1)
Open Access
- Open Access (59) (remove)
The overview of public key infrastructure based security approaches for vehicular communications
(2015)
Modern transport infrastructure becomes a full member of globally connected network. Leading vehicle manufacturers have already triggered development process, output of which will open a new horizon of possibilities for consumers and developers by providing a new communication entity - a car, thus enabling Car2X communications. Nevertheless some of available systems already provide certain possibilities for vehicles to communicate, most of them are considered not sufficiently secured. During last 15 years a number of big research projects funded by European Union and USA governments were started and concluded after which a set of standards were published prescribing a common architecture for Car2X and vehicles onboard communications. This work concentrates on combining inner and outer vehicular communications together with a use of Public Key Infrastructure (PKI).
Wireless communication systems more and more become part of our daily live. Especially with the Internet of Things (IoT) the overall connectivity increases rapidly since everyday objects become part of the global network. For this purpose several new wireless protocols have arisen, whereas 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) can be seen as one of the most important protocols within this sector. Originally designed on top of the IEEE802.15.4 standard it is a subject to various adaptions that will allow to use 6LoWPAN over different technologies; e.g. DECT Ultra Low Energy (ULE). Although this high connectivity offers a lot of new possibilities, there are several requirements and pitfalls coming along with such new systems. With an increasing number of connected devices the interoperability between different providers is one of the biggest challenges, which makes it necessary to verify the functionality and stability of the devices and the network. Therefore testing becomes one of the key components that decides on success or failure of such a system. Although there are several protocol implementations commonly available; e.g., for IoT based systems, there is still a lack of according tools and environments as well as for functional and conformance testing. This article describes the architecture and functioning of the proposed test framework based on Testing and Test Control Notation Version 3 (TTCN-3) for 6LoWPAN over ULE networks.
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.
Objective: Dickkopf 3 (DKK3) has been identified as a urinary biomarker. Values above 4000 pg/mg creatinine (Cr) were linked with a higher risk of short-term decline of kidney function (J Am Soc Nephrol 29: 2722–2733). However, as of today, there is little experience with DKK3 as a risk marker in everyday clinical practice. We used algorithm-based data analysis to evaluate the potential dependence of DKK3 in a cohort from a large single center in Germany.
Method: DKK3 was measured in all CKD patients in our center October 1 st 2018 till Dec. 31 2019, together with calculated GFR (eGFR) and urinary albumin/creatinine ratio (UACR). Kidney transplant patients were excluded. Until the end of follow-up Dec 31 st 2021, repeated measurements were performed for all parameters. Data analysis was performed using MD-Explorer (BioArtProducts, Rostock, Germany) and Python with multiple libraries. Linear regression models were applied in patients for DKK3, eGFR and UACR. Comparison of the models was performed with a twosided Kolmogorov-Smirnov test.
Results: 1206 DKK3 measurements were performed in 1103 patients (621 male, age 70yrs, eGFR 29,41 ml/min/1.73qm, UACR 800 mg/g). 134 patients died during follow-up. DKK3 mean was 2905 pg/mg Cr (max. 20000, 75 % percentile 3800). 121 pts had DKK3 > 4000. At the end of follow-up 7 % of patients with DKK3 < 4000 (initial eGFR 17.6) versus 39.6 % of patients with DDK3 > 4000 (initial eGFR 15.7) underwent dialysis. Compared to eGFR and UACR at baseline, DKK3 > 4000 performed best to predict eGFR loss over the next 12 months.
Conclusion: In this cohort of CKD patients, DKK3 > 4000 at baseline predicted the eGFR slope better than eGFR or UACR at baseline. DKK3 > 4000 reflected a higher risk of progression towards ESRD in patients with similar baseline eGFR levels.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
Bluetooth Low Energy extends the Bluetooth standard in version 4.0 for ultra-low energy applications through the extensive usage of low-power sleeping periods, which inherently difficult in frequency hopping technologies. This paper gives an introduction into the specifics of the Bluetooth Low Energy protocol, shows a sample implementation, where an embedded device is controlled by an Android smart phone, and shows the results of timing and current consumption measurements.
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indisputable logging. Ideally, the level of security for these IoT devices shall be very high, as they are specifically designed for this autonomous and networked environment. This paper discusses a use case of a company with legacy devices that wants to benefit from the features and functionality of blockchain technology. In particular, the implications of retrofit solutions are analyzed. The use of the BISS:4.0 platform is proposed as the underlying infrastructure. BISS:4.0 is
intended to integrate the blockchain technologies into existing enterprise environments. Furthermore, a security analysis of IoT and blockchain present attacks and countermeasures are presented that are identified and applied to the mentioned use case.
The increasing number of transistors being clocked at high frequencies of modern microprocessors lead to an increasing power consumption, which calls for an active dynamic thermal management. In a research project a system environment has been developed, which includes thermal modeling of the microprocessor in the board system, a software environment to control the characteristics of the system’s timing behavior, and a modified Linux scheduler, which is enhanced with a prediction controller. Measurement results are shown for this development for a Freescale i.MX6Q quad-core microprocessor.
This paper presents an overview of EREMI, a two-year project funded under ERASMUS+ KA203, and its results. The project team’s main objective was to develop and validate an advanced interdisciplinary higher education curriculum, which includes lifelong learning components. The curriculum focuses on enhancing resource efficiency in the manufacturing industry and optimising poorly or non-digitised industrial physical infrastructure systems. The paper also discusses the results of the project, highlighting the successful achievement of its goals. EREMI effectively supports the transition to Industry 5.0 by preparing a common European pool of future experts. Through comprehensive research and collaboration, the project team has designed a curriculum that equips students with the necessary skills and knowledge to thrive in the evolving manufacturing landscape. Furthermore, the paper explores the significance of EREMI’s contributions to the field, emphasising the importance of resource efficiency and system optimisation in industrial settings. By addressing the challenges posed by under-digitised infrastructure, the project aims to drive sustainable and innovative practices in manufacturing. All five project partner organisations have been actively engaged in offering relevant educational content and framework for decentralised sustainable economic development in regional and national contexts through capacity building at a local level. A crucial element of the added value is the new channel for obtaining feedback from students. The survey results, which are outlined in the paper, offer valuable insights gathered from students, contributing to the continuous improvement of the project.
The Thread protocol is a recent development based on 6LoWPAN (IPv6 over IEEE 802.15.4), but with extensions regarding a more media independent approach, which – additionally – also promises true interoperability. To evaluate and analyse the operation of a Thread network a given open source 6LoWPAN stack for embedded devices (emb::6) has been extended in order to comply with the Thread specification. The implementation covers Mesh Link Establishment (MLE) and network layer functionality as well as 6LoWPAN mesh under routing mechanism based on MAC short addresses. The development has been verified on a virtualization platform and allows dynamical establishment of network topologies based on Thread's partitioning algorithm.