Refine
Year of publication
Document Type
- Conference Proceeding (19)
- Article (reviewed) (15)
- Article (unreviewed) (3)
- Patent (2)
- Doctoral Thesis (1)
- Report (1)
Conference Type
- Konferenzartikel (18)
- Konferenzband (1)
Keywords
- Blockchain (5)
- blockchain (4)
- Internet of Things (3)
- machine learning (3)
- Eingebettetes System (2)
- IIoT (2)
- Neural networks (2)
- Scalability (2)
- efficient training (2)
- predictive maintenance (2)
- 5G (1)
- Aurikuläre Stimulation (1)
- Blockchain-to-Blockchain communication (1)
- Blockchains (1)
- Bloom filters (1)
- CIoT (1)
- Car-to-Car-(C2C)-Communication (1)
- Cellular networks (1)
- Cloud computing (1)
- Cloud storage (1)
- Cyber Physical Systems, (1)
- Deep learning (1)
- Edge AI (1)
- Elektroden-Interface (1)
- Embedded AI (1)
- Embedded Systems (1)
- Entropie (1)
- Federated Learning (1)
- Fernüberwachung (1)
- Heuristic algorithms (1)
- Higher Education (1)
- IT-Sicherheit (1)
- Industrial internet of things (1)
- Industrie 4.0 (1)
- Industry 4.0 (1)
- Industry automation (1)
- Internet der Dinge (1)
- Interoperability (1)
- IoT security (1)
- Kugellager (1)
- LPWAN (1)
- Low-latency (1)
- MEMS (1)
- Machine learning (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Maschinelles Lernen (1)
- Mikroelektronik (1)
- NB-IoT (1)
- Network Test (1)
- Netzwerk (1)
- Niedrige Energie (1)
- PUF key generation (1)
- Paketlogistik (1)
- Particle swarm optimization (1)
- Predictive Maintenance (1)
- Prozessor (1)
- Reinforcement learning (1)
- Security (1)
- Sensortechnik (1)
- Sicherheit (1)
- Simulation (1)
- TTCN3 (1)
- Testumgebung (1)
- TinyML (1)
- Traceability (1)
- URLLC (1)
- Unsupervised Learning (1)
- V2X (1)
- VANET (1)
- Variational Autoencoders (1)
- Vorausschauende Wartung (1)
- Wasserstand (1)
- accelerometer (1)
- analog physical unclonable function system (1)
- authentication (1)
- authorization (1)
- bearings (1)
- benchmarking (1)
- blockchain-based system (1)
- cloud computing (1)
- cluster (1)
- compression (1)
- cryptography (1)
- cybersecurity (1)
- distributed ledger (1)
- game theory (1)
- gossip protocol (1)
- gyroscope (1)
- inertial measurement unit (1)
- integer linear programming (1)
- intermediate domain (1)
- legacy machines (1)
- lifelong learning (1)
- maintenance (1)
- manufacturing industries (1)
- network optimization (1)
- outsourced computation (1)
- peer-to-peer (1)
- physically unclonable function (PUF) (1)
- quality feedback survey and results assessment (1)
- remaining useful life (1)
- resource efficiency (1)
- scalability (1)
- security (1)
- security keys (1)
- set operations (1)
- set relations (1)
- sharding algorithm (1)
- shop floor (1)
- sparse backpropagation (1)
- storage efficiency (1)
- storage optimization (1)
- summarization (1)
- syndrome coding (1)
- temperature dependency (1)
- topology (1)
- transfer learning (1)
- trust management (1)
- trust management system (1)
- unique interdisciplinary international higher education approach (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (41) (remove)
Open Access
- Open Access (41) (remove)
Wireless communication systems more and more become part of our daily live. Especially with the Internet of Things (IoT) the overall connectivity increases rapidly since everyday objects become part of the global network. For this purpose several new wireless protocols have arisen, whereas 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) can be seen as one of the most important protocols within this sector. Originally designed on top of the IEEE802.15.4 standard it is a subject to various adaptions that will allow to use 6LoWPAN over different technologies; e.g. DECT Ultra Low Energy (ULE). Although this high connectivity offers a lot of new possibilities, there are several requirements and pitfalls coming along with such new systems. With an increasing number of connected devices the interoperability between different providers is one of the biggest challenges, which makes it necessary to verify the functionality and stability of the devices and the network. Therefore testing becomes one of the key components that decides on success or failure of such a system. Although there are several protocol implementations commonly available; e.g., for IoT based systems, there is still a lack of according tools and environments as well as for functional and conformance testing. This article describes the architecture and functioning of the proposed test framework based on Testing and Test Control Notation Version 3 (TTCN-3) for 6LoWPAN over ULE networks.
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relations as inclusiveness and disjointness based ao Bloom filters. We propose to compose them in a slightly different way by applying a keyed hash function. Besides discussing the correctness of set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. Indeed, our solution proposes to bring another layer of privacy on the sizes. We are in particular interested how the overlapping bits of a Bloom filter impact the privacy level of our approach. We concretely apply our solution to a use case of cloud security audit on access control and present our results with real-world parameters.
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indisputable logging. Ideally, the level of security for these IoT devices shall be very high, as they are specifically designed for this autonomous and networked environment. This paper discusses a use case of a company with legacy devices that wants to benefit from the features and functionality of blockchain technology. In particular, the implications of retrofit solutions are analyzed. The use of the BISS:4.0 platform is proposed as the underlying infrastructure. BISS:4.0 is
intended to integrate the blockchain technologies into existing enterprise environments. Furthermore, a security analysis of IoT and blockchain present attacks and countermeasures are presented that are identified and applied to the mentioned use case.
The increasing number of transistors being clocked at high frequencies of modern microprocessors lead to an increasing power consumption, which calls for an active dynamic thermal management. In a research project a system environment has been developed, which includes thermal modeling of the microprocessor in the board system, a software environment to control the characteristics of the system’s timing behavior, and a modified Linux scheduler, which is enhanced with a prediction controller. Measurement results are shown for this development for a Freescale i.MX6Q quad-core microprocessor.
This paper presents an overview of EREMI, a two-year project funded under ERASMUS+ KA203, and its results. The project team’s main objective was to develop and validate an advanced interdisciplinary higher education curriculum, which includes lifelong learning components. The curriculum focuses on enhancing resource efficiency in the manufacturing industry and optimising poorly or non-digitised industrial physical infrastructure systems. The paper also discusses the results of the project, highlighting the successful achievement of its goals. EREMI effectively supports the transition to Industry 5.0 by preparing a common European pool of future experts. Through comprehensive research and collaboration, the project team has designed a curriculum that equips students with the necessary skills and knowledge to thrive in the evolving manufacturing landscape. Furthermore, the paper explores the significance of EREMI’s contributions to the field, emphasising the importance of resource efficiency and system optimisation in industrial settings. By addressing the challenges posed by under-digitised infrastructure, the project aims to drive sustainable and innovative practices in manufacturing. All five project partner organisations have been actively engaged in offering relevant educational content and framework for decentralised sustainable economic development in regional and national contexts through capacity building at a local level. A crucial element of the added value is the new channel for obtaining feedback from students. The survey results, which are outlined in the paper, offer valuable insights gathered from students, contributing to the continuous improvement of the project.
The Thread protocol is a recent development based on 6LoWPAN (IPv6 over IEEE 802.15.4), but with extensions regarding a more media independent approach, which – additionally – also promises true interoperability. To evaluate and analyse the operation of a Thread network a given open source 6LoWPAN stack for embedded devices (emb::6) has been extended in order to comply with the Thread specification. The implementation covers Mesh Link Establishment (MLE) and network layer functionality as well as 6LoWPAN mesh under routing mechanism based on MAC short addresses. The development has been verified on a virtualization platform and allows dynamical establishment of network topologies based on Thread's partitioning algorithm.
OPC UA (Open Platform Communications Unified Architecture) is already a well-known concept used widely in the automation industry. In the area of factory automation, OPC UA models the underlying field devices such as sensors and actuators in an OPC UA server to allow connecting OPC UA clients to access device-specific information via a standardized information model. One of the requirements of the OPC UA server to represent field device data using its information model is to have advanced knowledge about the properties of the field devices in the form of device descriptions. The international standard IEC 61804 specifies EDDL (Electronic Device Description Language) as a generic language for describing the properties of field devices. In this paper, the authors describe a possibility to dynamically map and integrate field device descriptions based on EDDL into OPCUA.
Die neueste Generation von programmierbaren Logikbausteinen verfügt neben den konfigurierbaren Logikzellen über einen oder mehrere leistungsfähige Mikroprozessoren. In dieser Arbeit wird gezeigt, wie ein bestehendes Zwei-Chip-System auf einen Xilinx Zynq 7000 mit zwei ARM A9-Cores migriert wird. Bei dem System handelt es sich um das „GPS-gestützte Kreisel-system ADMA“ des Unternehmens GeneSys. Die neue Lösung verbessert den Datenaustausch zwischen dem ersten Mikroprozessor zur digitalen Signalverarbeitung und dem zweiten Prozessor zur Ablaufsteuerung durch ein Shared Memory. Für die schnelle und echtzeitfähige Datenübertragung werden zahlreiche hochbitratige Schnittstellengenutzt.
Legacy industrial communication protocols are proved robust and functional. During the last decades, the industry has invented completely new or advanced versions of the legacy communication solutions. However, even with the high adoption rate of these new solutions, still the majority industry applications run on legacy, mostly fieldbus related technologies. Profibus is one of those technologies that still keep on growing in the market, albeit a slow in market growth in recent years. A retrofit technology that would enable these technologies to connect to the Internet of Things, utilize the ever growing potential of data analysis, predictive maintenance or cloud-based application, while at the same time not changing a running system is fundamental.