Refine
Year of publication
Document Type
- Conference Proceeding (145)
- Article (reviewed) (28)
- Article (unreviewed) (19)
- Part of a Book (11)
- Patent (3)
- Report (3)
- Contribution to a Periodical (1)
Conference Type
- Konferenzartikel (143)
- Konferenz-Abstract (1)
- Sonstiges (1)
Is part of the Bibliography
- yes (210)
Keywords
- Kommunikation (11)
- Eingebettetes System (8)
- Blockchain (6)
- Sicherheit (5)
- Intelligentes Stromnetz (4)
- Internet of Things (4)
- Security (4)
- blockchain (4)
- Energieversorgung (3)
- IIoT (3)
- IoT security (3)
- Messung (3)
- Sensortechnik (3)
- cryptography (3)
- security (3)
- Applikation (2)
- Bearings (2)
- Blockchains (2)
- Drahtloses lokales Netz (2)
- IT-Sicherheit (2)
- Industrie 4.0 (2)
- Internet (2)
- Internet der Dinge (2)
- MEMS (2)
- Messtechnik (2)
- Monitoring (2)
- NB-IoT (2)
- Netzwerk (2)
- Neural networks (2)
- Niedrige Energie (2)
- PKI (2)
- PUF key generation (2)
- Predictive Maintenance (2)
- Predictive maintenance (2)
- Scalability (2)
- Sicherheitstechnik (2)
- TLS (2)
- accelerometer (2)
- certificate management (2)
- efficient training (2)
- machine learning (2)
- physical unclonable function (2)
- physically unclonable function (PUF) (2)
- predictive maintenance (2)
- printed electronics (2)
- resource efficiency (2)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 6LoWPAN (1)
- AIN Cantilever (1)
- Abbreviate Injury Scale (1)
- Accident Analysis (1)
- Advanced Driver Assistance System (1)
- Android (1)
- Aurikuläre Stimulation (1)
- Authentication (1)
- Authorization (1)
- Automation (1)
- Automatisierungssystem (1)
- Automatisierungstechnik (1)
- Automotive engineering (1)
- BACnet (1)
- Bearing fault classification (1)
- Blockchain-to-Blockchain communication (1)
- Bussystem (1)
- CIoT (1)
- Car-2-Car communication (1)
- Car-2-X communication (1)
- Car-to-Car-(C2C)-Communication (1)
- Cascading Style Sheets (1)
- Cellular networks (1)
- Cloud computing (1)
- Cloud storage (1)
- Collision Point (1)
- Communication (1)
- Computerunterstützte Kommunikation (1)
- Cyber Physical Systems, (1)
- Data breech (1)
- Deep learning (1)
- Design (1)
- Digitaltechnik (1)
- Dissens (1)
- EAP-TLS (1)
- ETAP Simulations (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Effizienz (1)
- Electronic Commerce (1)
- Elektroden-Interface (1)
- Embedded AI (1)
- Embedded Software (1)
- Embedded Systems (1)
- Energieverbrauch (1)
- Entropie (1)
- Entropy (1)
- Fahrzeug (1)
- Failure analysis (1)
- Fault Classification (1)
- Fault classification (1)
- Federated Learning (1)
- Feldbus (1)
- Field-programmable gate array (FPGA) (1)
- Flugdatenregistriergerät (1)
- Funktechnik (1)
- GPRS (1)
- Gateway (1)
- Gebäudeleittechnik (1)
- Grinding machines (1)
- Gruppe (1)
- Halbleitertechnologie (1)
- Haustechnik (1)
- Heuristic algorithms (1)
- Higher Education (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.11p/WAVE (1)
- IEEE802.15.4 (1)
- Implementation (1)
- Industrial Blockchain (1)
- Industrial internet of things (1)
- Industry 4.0 (1)
- Industry Use cases (1)
- Industry automation (1)
- Integrierte Schaltung (1)
- Intelligenter Zähler (1)
- Intermediate domain (1)
- Interoperability (1)
- IoT Security (1)
- Java <Programmiersprache> (1)
- Jitter (1)
- Kabel (1)
- Kommunikationsprotokoll (1)
- Kommunikationssystem (1)
- LPWAN (1)
- Leistung (1)
- Load Flow Analysis (1)
- Lokalisation (1)
- Long Term Evolution (1)
- Low-latency (1)
- Machine learning (1)
- Machine-learning (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Maschine (1)
- Mobile Computing (1)
- Mobilkommunikation (1)
- Monte-Carlo method (1)
- NETCONF security (1)
- Network Test (1)
- Noise measurement (1)
- OT security (1)
- PROFINET IO (1)
- PROFINET Security (1)
- Particle swarm optimization (1)
- Patient (1)
- Performance evaluation (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Power Loss (1)
- Produktion (1)
- Prozessor (1)
- Qualität (1)
- RUL (1)
- Radio frequency (1)
- Real-Time Communication (1)
- Reinforcement learning (1)
- Remaining useful life (1)
- Rundfunk (1)
- Schaltwerk (1)
- Sequenzielle Schaltung (1)
- Signaltechnik (1)
- Simulation (1)
- Smart Energy Metering (1)
- Smart Grid (1)
- Smart Metering (1)
- Smart metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Software (1)
- Sprachgebrauch (1)
- Strahl (1)
- Synchronisation (1)
- System (1)
- TSN security (1)
- TTCN3 (1)
- Target Vehicle (1)
- Terrestrisches Laserscanning (1)
- Testbed (1)
- Testumgebung (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- TinyML (1)
- TinyOS (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transfer learning (1)
- Trust management (1)
- Trägheit (1)
- UMTS (1)
- URLLC (1)
- Ultra-Low Energy (1)
- Ultraweitband (1)
- Umwelt (1)
- Unsupervised Learning (1)
- V2X (1)
- VANET (1)
- VRU eSafety (1)
- Variational Autoencoders (1)
- Vehicle safety (1)
- Versorgungstechnik (1)
- Verteilung (1)
- Voltage measurement (1)
- Wasser (1)
- Wasserstand (1)
- Wireless Body Area Networks (1)
- Wireless IoT (1)
- Wireless M-Bus (1)
- algorithm-based data analysis (1)
- analog physical unclonable function system (1)
- authentication (1)
- authorization (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- blockchain-based system (1)
- car2x networks (1)
- cellular radio (1)
- cluster (1)
- compression (1)
- computer network management (1)
- credentials (1)
- crossbar (1)
- cybersecurity (1)
- degradation stages (1)
- dickkopf 3 (1)
- distributed ledger (1)
- e-Mobilität (1)
- eingebettetes System (1)
- embedded systems (1)
- emulation (1)
- fingerprinting (1)
- game theory (1)
- gossip protocol (1)
- gyroscope (1)
- hybrid networks (1)
- hybrid systems (1)
- identification (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- inertial measurement unit (1)
- integer linear programming (1)
- intermediate domain (1)
- kabellos (1)
- legacy machines (1)
- lifelong learning (1)
- localization (1)
- low-cost sensors and devices (1)
- machine-to-machine communication (1)
- maintenance (1)
- manufacturing industries (1)
- metal oxide transistor (1)
- model driven design (1)
- mutual authentication (1)
- network optimization (1)
- peer-to-peer (1)
- performance (1)
- primary authentication (1)
- privacy (1)
- quality feedback survey and results assessment (1)
- radio networks (1)
- real time (1)
- real-time systems (1)
- rekeying (1)
- remaining useful life (1)
- scalability (1)
- secondary surveillance radar (1)
- secure communication (1)
- security keys (1)
- sensor and actuator networks (1)
- sharding algorithm (1)
- shop floor (1)
- smart metering (1)
- software defined radio (1)
- sparse backpropagation (1)
- standardization (1)
- storage efficiency (1)
- storage optimization (1)
- subsystem design (1)
- summarization (1)
- syndrome coding (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature dependency (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- topology (1)
- transfer learning (1)
- transmit beamforming (1)
- trust management (1)
- trust management system (1)
- unique interdisciplinary international higher education approach (1)
- wide area networks (1)
- Ökologie (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (134)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (120)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (85)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (3)
- Fakultät Medien (M) (ab 22.04.2021) (1)
- Zentrale Einrichtungen (1)
Open Access
- Closed Access (93)
- Open Access (59)
- Closed (38)
- Bronze (13)
- Gold (8)
- Diamond (4)
The next generation cellular networks are expected to improve reliability, energy efficiency, data rate, capacity and latency. Originally, Machine Type Communication (MTC) was designed for low-bandwidth high-latency applications such as, environmental sensing, smart dustbin, etc., but there is additional demand around applications with low latency requirements, like industrial automation, driver-less cars, and so on. Improvements are required in 4G Long Term Evolution (LTE) networks towards the development of next generation cellular networks for providing very low latency and high reliability. To this end, we present an in-depth analysis of parameters that contribute to the latency in 4G networks along with a description of latency reduction techniques. We implement and validate these latency reduction techniques in the open-source network simulator (NS3) for narrowband user equipment category Cat-Ml (LTE-M) to analyze the improvements. The results presented are a step towards enabling narrowband Ultra Reliable Low Latency Communication (URLLC) networks.
The excessive control signaling in Long Term Evolution networks required for dynamic scheduling impedes the deployment of ultra-reliable low latency applications. Semi-persistent scheduling was originally designed for constant bit-rate voice applications, however, very low control overhead makes it a potential latency reduction technique in Long Term Evolution. In this paper, we investigate resource scheduling in narrowband fourth generation Long Term Evolution networks through Network Simulator (NS3) simulations. The current release of NS3 does not include a semi-persistent scheduler for Long Term Evolution module. Therefore, we developed the semi-persistent scheduling feature in NS3 to evaluate and compare the performance in terms of uplink latency. We evaluate dynamic scheduling and semi-persistent scheduling in order to analyze the impact of resource scheduling methods on up-link latency.
The Datagram Transport Layer Security (DTLS) protocol has been designed to provide end-to-end security over unreliable communication links. Where its connection establishment is concerned, DTLS copes with potential loss of protocol messages by implementing its own loss detection and retransmission scheme. However, the default scheme turns out to be suboptimal for links with high transmission error rates and low data rates, such as wireless links in electromagnetically harsh industrial environments. Therefore, in this paper, as a first step we provide an analysis of the standard DTLS handshake's performance under such adverse transmission conditions. Our studies are based on simulations that model message loss as the result of bit transmission errors. We consider several handshake variants, including endpoint authentication via pre-shared keys or certificates. As a second step, we propose and evaluate modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.
The Transport Layer Security (TLS) protocol is a cornerstone of secure network communication, not only for online banking, e-commerce, and social media, but also for industrial communication and cyber-physical systems. Unfortunately, implementing TLS correctly is very challenging, as becomes evident by considering the high frequency of bugfixes filed for many TLS implementations. Given the high significance of TLS, advancing the quality of implementations is a sustained pursuit. We strive to support these efforts by presenting a novel, response-distribution guided fuzzing algorithm for differential testing of black-box TLS implementations. Our algorithm generates highly diverse and mostly-valid TLS stimulation messages, which evoke more behavioral discrepancies in TLS server implementations than other algorithms. We evaluate our algorithm using 37 different TLS implementations and discuss―by means of a case study―how the resulting data allows to assess and improve not only implementations of TLS but also to identify underspecified corner cases. We introduce suspiciousness as a per-implementation metric of anomalous implementation behavior and find that more recent or bug-fixed implementations tend to have a lower suspiciousness score. Our contribution is complementary to existing tools and approaches in the area, and can help reveal implementation flaws and avoid regression. While being presented for TLS, we expect our algorithm's guidance scheme to be applicable and useful also in other contexts. Source code and data is made available for fellow researchers in order to stimulate discussions and invite others to benefit from and advance our work.
The paper describes the methodology and experimental results for revealing similarities in thermal dependencies of biases of accelerometers and gyroscopes from 250 inertial MEMS chips (MPU-9250). Temperature profiles were measured on an experimental setup with a Peltier element for temperature control. Classification of temperature curves was carried out with machine learning approach.
A perfect sensor should not have thermal dependency at all. Thus, only sensors inside the clusters with smaller dependency (smaller total temperature slopes) might be pre-selected for production of high accuracy inertial navigation modules. It was found that no unified thermal profile (“family” curve) exists for all sensors in a production batch. However, obviously, sensors might be grouped according to their parameters. Therefore, the temperature compensation profiles might be regressed for each group. 12 slope coefficients on 5 degrees temperature intervals from 0°C to +60°C were used as the features for the k-means++ clustering algorithm.
The minimum number of clusters for all sensors to be well separated from each other by bias thermal profiles in our case is 6. It was found by applying the elbow method. For each cluster a regression curve can be obtained.
Recently, the demand for scalable, efficient and accurate Indoor Positioning Systems (IPS) has seen a rising trend due to their utility in providing Location Based Services (LBS). Visible Light Communication (VLC) based IPS designs, VLC-IPS, leverage Light Emitting Diodes (LEDs) in indoor environments for localization. Among VLC-based designs, Time Difference of Arrival (TDOA) based techniques are shown to provide very low errors in the relative position of receivers. Our considered system consists of five LEDs that act as transmitters and a single receiver (photodiode or image sensor in smart phone) whose position coordinates in an indoor environment are to be determined. As a performance criterion, Cramer Rao Lower Bound (CRLB) is derived for range estimations and the impact of various factors, such as, LED transmission frequency, position of reference LED light, and the number of LED lights, on localization accuracy has been studied. Simulation results show that depending on the optimal values of these factors, location estimation on the order of few centimeters can be realistically achieved.
Real-Time Ethernet has become the major communication technology for modern automation and industrial control systems. On the one hand, this trend increases the need for an automation-friendly security solution, as such networks can no longer be considered sufficiently isolated. On the other hand, it shows that, despite diverging requirements, the domain of Operational Technology (OT) can derive advantage from high-volume technology of the Information Technology (IT) domain. Based on these two sides of the same coin, we study the challenges and prospects of approaches to communication security in real-time Ethernet automation systems. In order to capitalize the expertise aggregated in decades of research and development, we put a special focus on the reuse of well-established security technology from the IT domain. We argue that enhancing such technology to become automation-friendly is likely to result in more robust and secure designs than greenfield designs. Because of its widespread deployment and the (to this date) nonexistence of a consistent security architecture, we use PROFINET as a showcase of our considerations. Security requirements for this technology are defined and different well-known solutions are examined according their suitability for PROFINET. Based on these findings, we elaborate the necessary adaptions for the deployment on PROFINET.
Wireless sensor networks have recently found their way into a wide range of applications among which environmental monitoring system has attracted increasing interests of researchers. Such monitoring applications, in general, don way into a wide range of applications among which environmental monitoring system has attracted increasing interests of researc latency requirements regarding to the energy efficiency. Also a challenge of this application is the network topology as the application should be able to be deployed in very large scale. Nevertheless low power consumption of the devices making up the network must be on focus in order to maximize the lifetime of the whole system. These devices are usually battery-powered and spend most of their energy budget on radio transceiver module. A so-called Wake-On-Radio (WoR) technology can be used to achieve a reasonable balance among power consumption, range, complexity and response time. In this paper, some designs for integration of WOR into IEEE 802.1.5.4 are to be discussed, providing an overview of trade-offs in energy consumption while deploying the WoR schemes in a monitoring system.
Environmental Monitoring is an attractive application field for Wireless Sensor Network (WSN). Water Level Monitoring helps to increase the efficiency of water distribution and management. In Pakistan, the world’s largest irrigation system covers 90.000 km of channels which needs to be monitored and managed on different levels. Especially the sensor systems for the small distribution channels need to be low energy and low cost. The distribution presents a technical solution for a communication system which is developed in a research project being co-funded by German Academic Exchange Service (DAAD). The communication module is based on IEEE-802.15.4 transceivers which are enhanced through Wake-On-Radio (WOR) to combine low-energy and real-time behavior. On higher layers, IPv6 (6LoWPAN) and corresponding routing protocols like Routing Protocol for Low power and Lossy Networks (RPL) can extend range of the network. The data are stored in a database and can be viewed online via a web interface. Of course, also automatic data analysis can be performed.
Digital networked communications are the key to all Internet-of-Things applications, especially to smart metering systems and the smart grid. In order to ensure a safe operation of systems and the privacy of users, the transport layer security (TLS) protocol, a mature and well standardized solution for secure communications, may be used. We implemented the TLS protocol in its latest version in a way suitable for embedded and resource-constrained systems. This paper outlines the challenges and opportunities of deploying TLS in smart metering and smart grid applications and presents performance results of our TLS implementation. Our analysis shows that given an appropriate implementation and configuration, deploying TLS in constrained smart metering systems is possible with acceptable overhead.
The application of leaky feeder (radiating) cables is a common solution for the implementation of reliable radio communication in huge industrial buildings, tunnels and mining environment. This paper explores the possibilities of leaky feeders for 1D and 2D localization in wireless systems based on time of flight chirp spread spectrum technologies. The main focus of this paper is to present and analyse the results of time of flight and received signal strength measurements with leaky feeders in indoor and outdoor conditions. The authors carried out experiments to compare ranging accuracy and radio coverage area for a point-like monopole antenna and for a leaky feeder acting as a distributed antenna. In all experiments RealTrac equipment based on nanoLOC radio standard was used. The estimation of the most probable path of a chirp signal going through a leaky feeder was calculated using the ray tracing approach. The typical non-line-of-sight errors profiles are presented. The results show the possibility to use radiating cables in real time location technologies based on time-of-flight method.
The IEEE802.11p standard describes a protocol for car-to-X and mainly for car-to-car-communication. It has found its place in hardware and firmware implementations and is currently tested in various field tests. In the research project Ko-TAG, which is part of the research initiative Ko-FAS, cooperative sensor technology is developed and its benefit for traffic safety applications is evaluated. A secondary radar principle based on communication signals enables localization of objects with simultaneous data transmission. It mainly concentrates on the detection of pedestrians and other vulnerable road users (VRU), but also supports pre crash safety applications. The Ko-TAG proposal enriches the current IEEE802.11p real-time characteristics needed for precise time-of-flight real-time localization. This contribution describes the development of a subsystem, which extends the functionality of IEEE802.11p and fits into the regulatory schemes. It discusses the approach for definition and verification of the protocol design, while maintaining the close coexistence with existing IEEE802.11p subsystems. System simulations were performed and hardware was implemented. The next step will be field measurements to verify the simulation results.
The increasing number of transistors being clocked at high frequencies of modern microprocessors lead to an increasing power consumption, which calls for an active dynamic thermal management. In a research project a system environment has been developed, which includes thermal modeling of the microprocessor in the board system, a software environment to control the characteristics of the system’s timing behavior, and a modified Linux scheduler, which is enhanced with a prediction controller. Measurement results are shown for this development for a Freescale i.MX6Q quad-core microprocessor.
Die zunehmende Anzahl von Transistoren mit immer kleineren Strukturgrößen führt zu einer zunehmenden Leistungsaufnahme in modernen Prozessoren. Das gilt insbesondere für High-End Prozessoren, die mit einer hohen Taktfrequenz betrieben werden. Die aufgenommene Leistung wird in Wärme umgewandelt, die in einer Temperaturerhöhung der Prozessoren resultiert. Hohe Betriebstemperaturen verursachen u.a. eine verringerte Rechenleistung, eine kürzere Lebensdauer des Prozessors und höhere Leckströme. Aus diesen Gründen wird aktives, dynamisches thermisches Management immer wichtiger. Dieser Beitrag stellt eine Erweiterung zu dem Standard- Linux-Scheduler in der Kernel-Version 3.0 für eingebettete Systeme vor: einen PID-Regler, der unter Angabe einer Solltemperatur eine dynamische Frequenz- und Spannungsskalierung durchführt. Die Experimente auf dem Freescale LMX6 Quadcore-Prozessor zeigen, dass der PID-Regler die Betriebstemperatur des Prozessors an die Solltemperatur regeln kann. Er ist die Grundlage für eine in Zukunft zu entwickelnde prädiktive Regelung.
The communication between objects, i.e. between cars (car-2-car, C2C), between cars and infrastructure (car-2-infrastructure, C2I) and between cars and vulnerable road users (car-2-VRU, C2VRU) is a major stepping stone towards traffic applications to enable efficient and safe traffic flow. However, these applications pose very high requirements to the communication protocols, which go beyond the capabilities of an available standardized solution.
This contribution shows how iterative design processes can help to fulfill these requirements, while re-using a maximum of elements from one level to the next and thus avoiding unrealistic overhead. In especially, the added value of simulation and emulation in this iterative process is elaborated.