ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik
Refine
Year of publication
Document Type
- Conference Proceeding (126)
- Article (reviewed) (31)
- Contribution to a Periodical (10)
- Article (unreviewed) (9)
- Master's Thesis (5)
- Part of a Book (4)
- Patent (3)
- Report (3)
- Book (2)
- Doctoral Thesis (2)
Conference Type
- Konferenzartikel (125)
- Konferenzband (1)
Keywords
- Blockchain (8)
- Eingebettetes System (8)
- Internet der Dinge (5)
- 6LoWPAN (4)
- IT-Sicherheit (4)
- Internet of Things (4)
- Kommunikation (4)
- blockchain (4)
- cryptography (4)
- 5G (3)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (195)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (101)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (77)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (12)
- Fakultät Medien (M) (ab 22.04.2021) (2)
Open Access
- Closed Access (83)
- Open Access (64)
- Closed (38)
- Bronze (22)
- Gold (12)
- Diamond (6)
- Grün (1)
Funding number
- 16KIS1403 (1)
The paper discusses the process of block parallelization in the Advanced Encryption Standard (AES) cipher, focusing on the Counter (CTR) mode. It details the benefits of this process, including increased data processing performance and effective resource utilization; emphasizes the independent encryption of each data block in CTR mode, which allows for effective parallelization, especially when handling large data volumes. This work outlines the steps involved in the AES operation scheme in CTR mode, from splitting data into blocks to generating the final ciphertext. It further explains the concept of a unique "counter"or "initialization vector"for each block, which, combined with the key, generates a unique encryption key, enabling parallel processing. The idea implementation delves into the programming of the block parallelization algorithm using services on the Java Spring Boot platform. It describes the roles of the purposed Client Service and Server Service in encrypting and transmitting messages and files and decrypting received messages. This work presents an experiment that tests the hypothesis that blocks parallelization in AES cipher using CTR mode increases performance during the processing of large data volumes. The experiment involves different data volumes and compares the processing speeds of the AES algorithm with and without parallelization. The results confirm the hypothesis, showing that block parallelization in AES for large data volumes can double the data processing speed compared to the non-parallel approach. The paper concludes that block parallelization might be effective not only for the AES algorithm but also for any block symmetric algorithm. It also suggests that parallelization allows for more efficient use of multi-core systems and reduces the execution time to complete the encryption operation. © 2021 Copyright for this paper try its authors.
Verfahren zum Erzeugen einer Sicherheitskennung, wobei das Verfahren folgende Schritte aufweist:- Maximieren der von einer analogen Entropiequelle abgeleiteten Entropie durch ein Verfahren zum Maximieren der von einer analogen Entropiequelle abgeleiteten Entropie, wobei das Verfahren zum Maximieren der von einer analogen Entropiequelle abgeleiteten Entropie ein Bereitstellen von Eingabedaten für die analoge Entropiequelle (2), ein Erzeugen von Rückgabewerten durch die analoge Entropiequelle basierend auf den Eingabedaten (3), und ein Gruppieren der Rückgabewerte aufweist, wobei das Gruppieren der Rückgabewerte ein Anwenden von Versätzen auf Rückgabewerte aufweist, und- Erzeugen der Sicherheitskennung basierend auf der erzeugten maximierten Entropie (8), wobei die analoge Entropiequelle eine Physical Unclonable Function oder eine biometrische Quelle ist, und wobei das Anwenden von Versätzen ein Einteilen von Rückgabewerten in dieselbe Gruppe, obwohl der Abstand zwischen den entsprechenden Rückgabewerten kleiner als ein entsprechender Grenzwert für den Abstand zwischen zwei Rückgabewerten ist, indem Versätze eingeführt werden, so dass es erscheint, als würde der Abstand zwischen den entsprechenden Rückgabewerten dem entsprechenden Grenzwert für den Abstand zwischen zwei Rückgabewerten entsprechen, aufweist.
Even though Controller Area Networks (CAN) were originally conceptualized as deeply embedded networks, nowadays they are no longer self-contained. The use of bridges and gateways with access to the Internet opens additional attack surfaces. Therefore, comprehensive countermeasures are required, including the mutual authentication of the communication endpoints using public-key certificates. However, this calls for the continuous availability of credentials in the form of device-granular certificates, private keys, and trust anchors. This paper presents a concept and implementation for credential management in CANopen FD networks throughout the complete life cycle of CANopen FD devices, from their manufacturing over commissioning and operations until their disposal, satisfying the prerequisite for establishing mutually authenticated connections based on certificates. This includes the initial provisioning, continuous renewal, removal, and revocation of credentials. The novel aspect of our paper comprises a complete credential management realization. It is meeting all typical state of the art requirements and is based on similar approaches for Industrial Ethernet networks. Moreover, with our demonstrator implementation we not only show the feasibility of the concept, but also highlight that applicability of public-key infrastructure mechanisms in CANopen FD networks with comparably resource-constrained nodes with limited packet sizes.
With the advent of the cryptographic security ex-tensions for PROFINET Security Class 2/3, as specified by PROFIBUS & PROFINET International, there arises a signif-icant difference between the establishment of a conventional (insecure) and a secure application relation (AR). However, to the best of our knowledge, there is no study yet that numeralizes how much delay is induced by the computational and communication overhead of the secure AR establishment. Therefore, we study its performance by runtime measurements using an experimental hardware setup. We answer two research questions: (1) how much additional runtime delay is induced by the currently specified security extensions when performing a secure AR establishment, and (2) what is the impact of currently unspecified options to reduce this delay? In particular, we study the options to use the Extensible Authentication Protocol (EAP) with Transport Layer Security (TLS) for full handshakes and session resumption, version 1.2 and 1.3, certificate-based and pre-shared-key-based (PSK) ciphersuites, as well as EAP-PSK. We gain the insight that the currently specified extensions lead to a best case delay of 17.5 ms and a worst case delay of 288.6 ms for full handshakes and to 7.3 and 9.8 ms for resumed sessions. With the currently unspecified option to use pre-shared-key-based ciphersuites, yet providing perfect forward security, the best case delay for full handshakes is reduced by 25.7 % and the worst case delay by 91.1 %. With the currently unspecified EAP-PSK option, which does not provide PFS, the largest reduction is achieved by 78.4 and 98.7 % related to best and worst case full handshakes. The authors are members of the PROFINET Working Group CBIPG 10 Security.
Performance benchmarking is crucial for optimizing networks, including 5G Non-Public Networks (5G-NPN). Since one of the major advantages of 5G-NPN is to guarantee Quality of Service (QoS), ensuring optimal performance for their diverse applications is critical. This requires adjustments and testing of various radio-related parameters. Also, performance analysis and benchmarking need to be done based on the evaluation of relevant Key Parameter Indicators (KPIs) in order to identify the parameter set for the optimum performance for each application’s requirements. Many published results on performance benchmarking often lack transparency in their scoring methods. Additionally, QoS benchmarking evaluation for 5G-NPN use cases needs further steps due to the varying ranges of their KPIs. For example Block Error Rate (BLER) is mostly represented by percentage, while Reference Signal Received Power (RSRP) and Reference Signal Received Quality (RSRQ) are negative values.3GPP in TR 103.559 outlines practices for benchmarking network QoS, with a focus on Speech and multimedia Transmission Quality (STQ). This paper extends these outlines to evaluate 5G-NPN performance by defining a multi-objective function. We select a specific 5G-NPN use case as an example and apply four tests with varying network configurations. After each test, we collect most relevant 5G KPIs. To facilitate comparison, all KPIs are rescaled to a common scale. Additionally, we assign weights to each KPI based on its significance in the chosen use case. By combining rescaling and weight assignments, we propose a single metric that effectively characterizes the overall network performance for 5G-NPNs based on their specific use case requirements.
Traditional authentication involves sharing a considerable amount of personal and identifying information. Usually, a single central authority controls the data of all their users. This creates a single point of failure and users typically have to relinquish control over their data. Therefore it is important to explore alternate authentication mechanisms to uphold data sovereignty. Data sovereignty describes forms of independence, control, and autonomy over digital data. Enforcing data sovereignty also requires independence from central authorities. This paper explores alternate decentralized authentication methods. It leverages Verifiable Credentials (VCs) which allow verification without needing to contact the issuer and self-sovereign identities in the form of Decentralized IDentifiers (DIDs). This paper aims to leverage the decentralized authentication supported by VCs and DIDs and provide two use cases that might explain how they could be used.
Over the years, the Internet of Things has brought significant benefits to modern society, lives, and industries; however, the technology used has yet to mature sufficiently to provide secure devices and communication. Recently, the number of connected devices rapidly grows, thus adversaries have more opportunities to gain access to IoT devices and use them to launch what is called large-scale attacks. With the rapid proliferation of Internet of Things (IoT) devices, the need for efficient and effective Intrusion Detection System (IDS) tailored for IoT environments has become increasingly paramount. This paper explores various techniques employed in contemporary IoT IDS, including traditional signature-based approaches like Snort and Bro/Zeek, as well as emerging deep learning-based methods.
Narrow Band-Wireless Wide Area Networking (NB-WWAN) technologies are becoming more popular across a wide range of application domains due to their ability to provide spatially distributed and reliable wireless connectivity in addition to offering low data rates, low bandwidth, long-range, and long battery life. For functional testing and performance assessments, the wide range of wireless technology alternatives within this category poses several difficulties. At the device level, it is necessary to address issues such as resource limitations, complex protocols, interoperability, and reliability, while at the network level, challenges include complex topologies and wireless channel/signal propagation problems. Testing the functionality and measuring the performance of spatially distributed NB-WWAN systems require a systematic approach to overcome these challenges. Furthermore, to provide a seamless test flow, it is also critical to test and compare the performance of wireless systems systematically and consistently across the different system development phases. To evaluate NB-WWAN technologies comprehensively across multiple abstraction levels—network simulators, emulated lab testbeds, and field test environments—we propose a unified multi-abstraction-level testing methodology. A detailed technical description of the prototype implementation and its evaluation is presented in this paper.