Skip to main content

Showing 1–50 of 67 results for author: Carle, G

.
  1. arXiv:2405.09264  [pdf, other

    cs.NI cs.CR

    A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights

    Authors: Marcel Kempf, Nikolas Gauder, Benedikt Jaeger, Johannes Zirngibl, Georg Carle

    Abstract: QUIC is a new network protocol standardized in 2021. It was designed to replace the TCP/TLS stack and is based on UDP. The most current web standard HTTP/3 is specifically designed to use QUIC as transport protocol. QUIC claims to provide secure and fast transport with low-latency connection establishment, flow and congestion control, reliable delivery, and stream multiplexing. To achieve the secu… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Presented at the 2024 IFIP Networking Conference (IFIP Networking)

  2. arXiv:2401.11731  [pdf, other

    cs.NI cs.AI cs.LG

    Fast and Scalable Network Slicing by Integrating Deep Learning with Lagrangian Methods

    Authors: Tianlun Hu, Qi Liao, Qiang Liu, Antonio Massaro, Georg Carle

    Abstract: Network slicing is a key technique in 5G and beyond for efficiently supporting diverse services. Many network slicing solutions rely on deep learning to manage complex and high-dimensional resource allocation problems. However, deep learning models suffer limited generalization and adaptability to dynamic slicing configurations. In this paper, we propose a novel framework that integrates constrain… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 6 pages, 5 figures, IEEE Global Communications Conference 2023

  3. arXiv:2310.17052  [pdf, other

    cs.NI

    Real-Time Performance of OPC UA

    Authors: Erkin Kirdan, Filip Rezabek, Nikolas Mülbauer, Georg Carle, Marc-Oliver Pahl

    Abstract: OPC UA is an industry-standard machine-to-machine communication protocol in the Industrial Internet of Things. It relies on time-sensitive networking to meet the real-time requirements of various applications. Time-sensitive networking is implemented through various queueing disciplines (qdiscs), including Time Aware Priority, Multiqueue Priority, Earliest TxTime First, and Credit-Based Shaper. De… ▽ More

    Submitted 19 November, 2023; v1 submitted 25 October, 2023; originally announced October 2023.

  4. Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns

    Authors: Patrick Sattler, Johannes Zirngibl, Mattijs Jonker, Oliver Gasser, Georg Carle, Ralph Holz

    Abstract: Internet-wide scans are an important tool to evaluate the deployment of services. To enable large-scale application layer scans, a fast, stateless port scan (e.g., using ZMap) is often performed ahead of time to collect responsive targets. It is a common expectation that port scans on the entire IPv4 address space provide a relatively unbiased view as they cover the complete address space. Previou… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  5. arXiv:2310.16190  [pdf, other

    cs.DC cs.CR cs.PF

    Multilayer Environment and Toolchain for Holistic NetwOrk Design and Analysis

    Authors: Filip Rezabek, Kilian Glas, Richard von Seck, Achraf Aroua, Tizian Leonhardt, Georg Carle

    Abstract: The recent developments and research in distributed ledger technologies and blockchain have contributed to the increasing adoption of distributed systems. To collect relevant insights into systems' behavior, we observe many evaluation frameworks focusing mainly on the system under test throughput. However, these frameworks often need more comprehensiveness and generality, particularly in adopting… ▽ More

    Submitted 26 October, 2023; v1 submitted 24 October, 2023; originally announced October 2023.

  6. QUIC on the Highway: Evaluating Performance on High-rate Links

    Authors: Benedikt Jaeger, Johannes Zirngibl, Marcel Kempf, Kevin Ploch, Georg Carle

    Abstract: QUIC is a new protocol standardized in 2021 designed to improve on the widely used TCP / TLS stack. The main goal is to speed up web traffic via HTTP, but it is also used in other areas like tunneling. Based on UDP it offers features like reliable in-order delivery, flow and congestion control, streambased multiplexing, and always-on encryption using TLS 1.3. Other than with TCP, QUIC implements a… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: Presented at the 2023 IFIP Networking Conference (IFIP Networking)

  7. arXiv:2309.15492  [pdf, other

    cs.RO

    EDGAR: An Autonomous Driving Research Platform -- From Feature Development to Real-World Application

    Authors: Phillip Karle, Tobias Betz, Marcin Bosk, Felix Fent, Nils Gehrke, Maximilian Geisslinger, Luis Gressenbuch, Philipp Hafemann, Sebastian Huber, Maximilian Hübner, Sebastian Huch, Gemb Kaljavesi, Tobias Kerbl, Dominik Kulmer, Tobias Mascetta, Sebastian Maierhofer, Florian Pfab, Filip Rezabek, Esteban Rivera, Simon Sagmeister, Leander Seidlitz, Florian Sauerbeck, Ilir Tahiraj, Rainer Trauth, Nico Uhlemann , et al. (9 additional authors not shown)

    Abstract: While current research and development of autonomous driving primarily focuses on develo** new features and algorithms, the transfer from isolated software components into an entire software stack has been covered sparsely. Besides that, due to the complexity of autonomous software stacks and public road traffic, the optimal validation of entire stacks is an open research problem. Our paper targ… ▽ More

    Submitted 16 January, 2024; v1 submitted 27 September, 2023; originally announced September 2023.

  8. Evaluating the Benefits: Quantifying the Effects of TCP Options, QUIC, and CDNs on Throughput

    Authors: Simon Bauer, Patrick Sattler, Johannes Zirngibl, Christoph Schwarzenberg, Georg Carle

    Abstract: To keep up with increasing demands on quality of experience, assessing and understanding the performance of network connections is crucial for web service providers. While different measures, like TCP options, alternative transport layer protocols like QUIC, or the hosting of services in CDNs, are expected to improve connection performance, no studies are quantifying such impacts on connections on… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Comments: Presented at the ACM/IRTF Applied Networking Research Workshop 2023 (ANRW23)

  9. A First Look at SVCB and HTTPS DNS Resource Records in the Wild

    Authors: Johannes Zirngibl, Patrick Sattler, Georg Carle

    Abstract: The Internet Engineering Task Force is standardizing new DNS resource records, namely SVCB and HTTPS. Both records inform clients about endpoint and service properties such as supported application layer protocols, IP address hints or Encrypted Client Hello (ECH) information. Therefore, they allow clients to reduce required DNS queries and potential retries during connection establishment and thus… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Comments: Presented at the 8th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2023)

  10. arXiv:2309.05525  [pdf, other

    cs.NI cs.LG

    Advancing Federated Learning in 6G: A Trusted Architecture with Graph-based Analysis

    Authors: Wenxuan Ye, Chendi Qian, Xueli An, Xueqiang Yan, Georg Carle

    Abstract: Integrating native AI support into the network architecture is an essential objective of 6G. Federated Learning (FL) emerges as a potential paradigm, facilitating decentralized AI model training across a diverse range of devices under the coordination of a central server. However, several challenges hinder its wide application in the 6G context, such as malicious attacks and privacy snoo** on lo… ▽ More

    Submitted 27 September, 2023; v1 submitted 11 September, 2023; originally announced September 2023.

    Comments: Accepted by IEEE Global Communications Conference (GLOBECOM) 2023

  11. QUIC Hunter: Finding QUIC Deployments and Identifying Server Libraries Across the Internet

    Authors: Johannes Zirngibl, Florian Gebauer, Patrick Sattler, Markus Sosnowski, Georg Carle

    Abstract: The diversity of QUIC implementations poses challenges for Internet measurements and the analysis of the QUIC ecosystem. While all implementations follow the same specification and there is general interoperability, differences in performance, functionality, but also security (e.g., due to bugs) can be expected. Therefore, knowledge about the implementation of an endpoint on the Internet can help… ▽ More

    Submitted 19 March, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: preprint

    Journal ref: Proceedings of the Passive and Active Measurement Conference 2024 (PAM '24)

  12. arXiv:2307.06872  [pdf, other

    cs.NI

    Target Acquired? Evaluating Target Generation Algorithms for IPv6

    Authors: Lion Steger, Liming Kuang, Johannes Zirngibl, Georg Carle, Oliver Gasser

    Abstract: Internet measurements are a crucial foundation of IPv6-related research. Due to the infeasibility of full address space scans for IPv6 however, those measurements rely on collections of reliably responsive, unbiased addresses, as provided e.g., by the IPv6 Hitlist service. Although used for various use cases, the hitlist provides an unfiltered list of responsive addresses, the hosts behind which c… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: Proceedings of the Network Traffic Measurement and Analysis Conference (TMA)

  13. Inter-Cell Network Slicing With Transfer Learning Empowered Multi-Agent Deep Reinforcement Learning

    Authors: Tianlun Hu, Qi Liao, Qiang Liu, Georg Carle

    Abstract: Network slicing enables operators to efficiently support diverse applications on a common physical infrastructure. The ever-increasing densification of network deployment leads to complex and non-trivial inter-cell interference, which requires more than inaccurate analytic models to dynamically optimize resource management for network slices. In this paper, we develop a DIRP algorithm with multipl… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: 14 pages, 14 figures, IEEE Open Journal of the Communications Society

    Journal ref: Volume 4, 2023, Pages 1141 - 1155

  14. Network Slicing via Transfer Learning aided Distributed Deep Reinforcement Learning

    Authors: Tianlun Hu, Qi Liao, Qiang Liu, Georg Carle

    Abstract: Deep reinforcement learning (DRL) has been increasingly employed to handle the dynamic and complex resource management in network slicing. The deployment of DRL policies in real networks, however, is complicated by heterogeneous cell conditions. In this paper, we propose a novel transfer learning (TL) aided multi-agent deep reinforcement learning (MADRL) approach with inter-agent similarity analys… ▽ More

    Submitted 23 June, 2023; v1 submitted 9 January, 2023; originally announced January 2023.

    Comments: 6 pages, 8 figures, IEEE Global Communications Conference 2022

  15. Rusty Clusters? Dusting an IPv6 Research Foundation

    Authors: Johannes Zirngibl, Lion Steger, Patrick Sattler, Oliver Gasser, Georg Carle

    Abstract: The long-running IPv6 Hitlist service is an important foundation for IPv6 measurement studies. It helps to overcome infeasible, complete address space scans by collecting valuable, unbiased IPv6 address candidates and regularly testing their responsiveness. However, the Internet itself is a quickly changing ecosystem that can affect longrunning services, potentially inducing biases and obscurities… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

  16. arXiv:2209.00965  [pdf, other

    cs.NI

    Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments

    Authors: Jonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Patrick Sattler, Johannes Zirngibl, Georg Carle, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we study the potentials of passive measurements to gain advanced knowledge about QUIC deployments. By analyzing one month backscatter traffic of the /9 CAIDA network telescope, we are able to make the following observations. First, we can identify different off-net deployments of hypergiants, using packet features such as QUIC source connection IDs (SCID), packet coalescence, and pa… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: preprint

  17. Towards a Tectonic Traffic Shift? Investigating Apple's New Relay Network

    Authors: Patrick Sattler, Juliane Aulbach, Johannes Zirngibl, Georg Carle

    Abstract: Apple recently published its first Beta of the iCloud Private Relay, a privacy protection service with promises resembling the ones of VPNs. The architecture consists of two layers (ingress and egress), operated by disjoint providers. The service is directly integrated into Apple's operating systems and therefore provides a low entry level barrier for a large user base. It seems to be set up for m… ▽ More

    Submitted 26 September, 2022; v1 submitted 5 July, 2022; originally announced July 2022.

  18. arXiv:2206.13230  [pdf, other

    cs.NI cs.CR

    Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale

    Authors: Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra

    Abstract: Active measurements can be used to collect server characteristics on a large scale. This kind of metadata can help discovering hidden relations and commonalities among server deployments offering new possibilities to cluster and classify them. As an example, identifying a previously-unknown cybercriminal infrastructures can be a valuable source for cyber-threat intelligence. We propose herein an a… ▽ More

    Submitted 30 August, 2023; v1 submitted 27 June, 2022; originally announced June 2022.

    Comments: Original: https://dl.ifip.org/db/conf/tma/tma2022/tma2022-paper35.pdf Additional Material: https://active-tls-fingerprinting.github.io/

    Journal ref: Proc. Network Traffic Measurement and Analysis Conference (TMA) 2022

  19. arXiv:2206.03776  [pdf, other

    cs.CR

    High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings

    Authors: Christopher Harth-Kitzerow, Ajith Suresh, Yonqing Wang, Hossein Yalame, Georg Carle, Murali Annavaram

    Abstract: In this work, we present novel protocols over rings for semi-honest secure three-party computation (3PC) and malicious four-party computation (4PC) with one corruption. While most existing works focus on improving total communication complexity, challenges such as network heterogeneity and computational complexity, which impact MPC performance in practice, remain underexplored. Our protocols add… ▽ More

    Submitted 28 June, 2024; v1 submitted 8 June, 2022; originally announced June 2022.

  20. arXiv:2203.12646  [pdf, other

    cs.CR

    CRGC -- A Practical Framework for Constructing Reusable Garbled Circuits

    Authors: Christopher Harth-Kitzerow, Georg Carle, Fan Fei, Andre Luckow, Johannes Klepsch

    Abstract: In this work, we introduce two schemes to construct reusable garbled circuits (RGCs) in the semi-honest setting. Our completely reusable garbled circuit (CRGC) scheme allows the generator (party A) to construct and send an obfuscated boolean circuit along with an encoded input to the evaluator (party B). In contrast to Yao's Garbled Circuit protocol, B can securely evaluate the same CRGC with an a… ▽ More

    Submitted 6 May, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

    Comments: 13 pages, 7 figures

  21. arXiv:2202.12833  [pdf, other

    cs.NI cs.MA

    Inter-Cell Slicing Resource Partitioning via Coordinated Multi-Agent Deep Reinforcement Learning

    Authors: Tianlun Hu, Qi Liao, Qiang Liu, Dan Wellington, Georg Carle

    Abstract: Network slicing enables the operator to configure virtual network instances for diverse services with specific requirements. To achieve the slice-aware radio resource scheduling, dynamic slicing resource partitioning is needed to orchestrate multi-cell slice resources and mitigate inter-cell interference. It is, however, challenging to derive the analytical solutions due to the complex inter-cell… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: 6 pages, 10 figures, IEEE International Communication Conference 2022

  22. arXiv:2107.13268  [pdf, ps, other

    cs.NI cs.LG

    A Distributed Intelligence Architecture for B5G Network Automation

    Authors: Sayantini Majumdar, Riccardo Trivisonno, Georg Carle

    Abstract: The management of networks is automated by closed loops. Concurrent closed loops aiming for individual optimization cause conflicts which, left unresolved, leads to significant degradation in performance indicators, resulting in sub-optimal network performance. Centralized optimization avoids conflicts, but impractical in large-scale networks for time-critical applications. Distributed, pervasive… ▽ More

    Submitted 7 October, 2021; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: 6 pages, 4 figures. This work has been submitted to the IEEE Networking Letters for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  23. arXiv:2103.08348  [pdf, other

    cs.LG

    Decorrelating Adversarial Nets for Clustering Mobile Network Data

    Authors: Marton Kajo, Janik Schnellbach, Stephen S. Mwanje, Georg Carle

    Abstract: Deep learning will play a crucial role in enabling cognitive automation for the mobile networks of the future. Deep clustering, a subset of deep learning, could be a valuable tool for many network automation use-cases. Unfortunately, most state-of-the-art clustering algorithms target image datasets, which makes them hard to apply to mobile network data due to their highly tuned nature and related… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

  24. arXiv:2103.04764  [pdf, other

    cs.LG

    Neural Network-based Quantization for Network Automation

    Authors: Marton Kajo, Stephen S. Mwanje, Benedek Schultz, Georg Carle

    Abstract: Deep Learning methods have been adopted in mobile networks, especially for network management automation where they provide means for advanced machine cognition. Deep learning methods utilize cutting-edge hardware and software tools, allowing complex cognitive algorithms to be developed. In a recent paper, we introduced the Bounding Sphere Quantization (BSQ) algorithm, a modification of the k-Mean… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

  25. arXiv:2010.10278  [pdf, other

    cs.NI

    RAN Cognitive Controller

    Authors: Anubhab Banerjee, Stephen S. Mwanje, Georg Carle

    Abstract: Cognitive Autonomous Networks (CAN) deploys learning based Cognitive Functions (CF) instead of conventional rule-based SON Functions (SF) as Network Automation Functions (NAF) to increase the system autonomy. These CFs work in parallel sharing the same resources which give rise to conflicts among them which cannot be resolved using conventional rule based approach. Our main target is to design a C… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Comments: presented in 2nd KuVS Fachgespraech "Machine Learning & Networking" workshop 2020 in Wuerzburg (online)

    Report number: Nokia ITD-20-60125D

  26. arXiv:2006.16960  [pdf, other

    cs.CY

    Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness

    Authors: Kilian Holzapfel, Martina Karl, Linus Lotz, Georg Carle, Christian Djeffal, Christian Fruck, Christian Haack, Dirk Heckmann, Philipp H. Kindt, Michael Köppl, Patrick Krause, Lolian Shtembari, Lorenz Marx, Stephan Meighen-Berger, Birgit Neumair, Matthias Neumair, Julia Pollmann, Tina Pollmann, Elisa Resconi, Stefan Schönert, Andrea Turcati, Christoph Wiesinger, Giovanni Zattera, Christopher Allan, Esteban Barco , et al. (12 additional authors not shown)

    Abstract: We propose a decentralized digital contact tracing service that preserves the users' privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encounters of people, the contact time period, and estimates the proximity of the contact. We trace the users' contacts and the possible spread of infectious diseases while preventing locatio… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.

  27. arXiv:2004.07063  [pdf, other

    cs.CR eess.SY

    Hardening X.509 Certificate Issuance using Distributed Ledger Technology

    Authors: Holger Kinkelin, Richard von Seck, Christoph Rudolf, Georg Carle

    Abstract: The security of cryptographic communication protocols that use X.509 certificates depends on the correctness of those certificates. This paper proposes a system that helps to ensure the correct operation of an X.509 certification authority and its registration authorities. We achieve this goal by enforcing a policy-defined, multi-party validation and authorization workflow of certificate signing r… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

  28. arXiv:2003.03221  [pdf

    cs.NI cs.CR cs.PF

    Me Love (SYN-)Cookies: SYN Flood Mitigation in Programmable Data Planes

    Authors: Dominik Scholz, Sebastian Gallenmüller, Henning Stubbe, Bassam Jaber, Minoo Rouhi, Georg Carle

    Abstract: The SYN flood attack is a common attack strategy on the Internet, which tries to overload services with requests leading to a Denial-of-Service (DoS). Highly asymmetric costs for connection setup - putting the main burden on the attackee - make SYN flooding an efficient and popular DoS attack strategy. Abusing the widely used TCP as an attack vector complicates the detection of malicious traffic a… ▽ More

    Submitted 6 March, 2020; originally announced March 2020.

  29. arXiv:2001.07031  [pdf, other

    cs.NI

    On the Necessity and Design of Coordination Mechanism for Cognitive Autonomous Networks

    Authors: Anubhab Banerjee, Stephen S. Mwanje, Georg Carle

    Abstract: Cognitive Autonomous Networks (CAN) are promoted to advance Self Organizing Network (SON), replacing rule-based SON Functions (SFs) with Cognitive Functions (CFs), which learn optimal behavior by interacting with the network. As in SON, CFs do encounter conflicts due to overlap in parameters or objectives. However, owing to the non-deterministic behavior of CFs, these conflicts cannot be resolved… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

    Comments: submitted to AnNet 2020 (https://annet2020.loria.fr/)

  30. A Generalized TDoA/ToA Model for ToF Positioning

    Authors: Maximilian von Tschirschnitz, Marcel Wagner, Marc-Oliver Pahl, Georg Carle

    Abstract: Many applications require positioning. Time of Flight (ToF) methods calculate distances by measuring the propagation time of signals. We present a novel ToF localization method. Our new approach works infrastructure-less, without pre-defined roles like Anchors or Tags. It generalizes existing synchronization-less Time Difference of Arrival (TDoA) and Time of Arrival (ToA) algorithms. We show how k… ▽ More

    Submitted 12 January, 2020; v1 submitted 20 September, 2019; originally announced September 2019.

    Comments: Published in IEEEXplore: https://ieeexplore.ieee.org/abstract/document/8911742

  31. Clock Error Analysis of Common Time of Flight based Positioning Methods

    Authors: Maximilian von Tschirschnitz, Marcel Wagner, Marc-Oliver Pahl, Georg Carle

    Abstract: Today, many applications such as production or rescue settings rely on highly accurate entity positioning. Advanced Time of Flight (ToF) based positioning methods provide highaccuracy localization of entities. A key challenge for ToF based positioning is to synchronize the clocks between the participating entities. This paper summarizes and analyzes ToA and TDoA methods with respect to clock error… ▽ More

    Submitted 12 January, 2020; v1 submitted 20 September, 2019; originally announced September 2019.

    Comments: Published in IEEEXplore: https://ieeexplore.ieee.org/abstract/document/8911772

  32. arXiv:1909.08397  [pdf

    cs.NI

    5G QoS: Impact of Security Functions on Latency

    Authors: Sebastian Gallenmüller, Johannes Naab, Iris Adam, Georg Carle

    Abstract: Network slicing is considered a key enabler to 5th Generation (5G) communication networks. Mobile network operators may deploy network slices -- complete logical networks customized for specific services expecting a certain Quality of Service (QoS). New business models like Network Slice-as-a-Service offerings to customers from vertical industries require negotiated Service Level Agreement (SLA) c… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

  33. arXiv:1909.06344  [pdf, other

    cs.NI cs.PL

    The Case for Writing Network Drivers in High-Level Programming Languages

    Authors: Paul Emmerich, Simon Ellmann, Fabian Bonk, Alex Egger, Esaú García Sánchez-Torija, Thomas Günzel, Sebastian Di Luzio, Alexandru Obada, Maximilian Stadlmeier, Sebastian Voit, Georg Carle

    Abstract: Drivers are written in C or restricted subsets of C++ on all production-grade server, desktop, and mobile operating systems. They account for 66% of the code in Linux, but 39 out of 40 security bugs related to memory safety found in Linux in 2017 are located in drivers. These bugs could have been prevented by using high-level languages for drivers. We present user space drivers for the Intel ixgbe… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Journal ref: ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2019), 2019

  34. arXiv:1909.02871  [pdf, other

    cs.DC cs.NI

    Galois Field Arithmetics for Linear Network Coding using AVX512 Instruction Set Extensions

    Authors: Stephan M. Günther, Nicolas Appel, Georg Carle

    Abstract: Linear network coding requires arithmetic operations over Galois fields, more specifically over finite extension fields. While coding over GF(2) reduces to simple XOR operations, this field is less preferred for practical applications of random linear network coding due to high chances of linear dependencies and therefore redundant coded packets. Coding over larger fields such as GF(16) and GF(256… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: 6 pages, 2 figures, the updated finite field library is available under the LGPL at https://moep80211.net/plink/libmoepgf-avx512

  35. arXiv:1907.08849  [pdf, ps, other

    cs.CR cs.CY

    Next Generation Resilient Cyber-Physical Systems

    Authors: Michel Barbeau, Georg Carle, Joaquin Garcia-Alfaro, Vicenç Torra

    Abstract: Cyber-Physical Systems (CPS) consist of distributed engineered environments where the monitoring and surveillance tasks are governed by tightly integrated computing, communication and control technologies. CPS are omnipresent in our everyday life. Hacking and failures of such systems have impact on critical services with potentially significant and lasting consequences. In this paper, we review wh… ▽ More

    Submitted 8 November, 2019; v1 submitted 20 July, 2019; originally announced July 2019.

    Comments: 6 pages, 45 references

  36. arXiv:1907.04611  [pdf, other

    cs.NI

    Optimally Self-Healing IoT Choreographies

    Authors: Jan Seeger, Arne Bröring, Georg Carle

    Abstract: In the industrial Internet of Things domain, applications are moving from the Cloud into the edge, closer to the devices producing and consuming data. This means applications move from the scalable and homogeneous cloud environment into a constrained heterogeneous edge network. Making edge applications reliable enough to fulfill Industrie 4.0 use cases is still an open research challenge. Maintain… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

    Comments: 18 pages, submitted to ACM TOIT special issue "Evolution of IoT Networking Architectures"

  37. arXiv:1904.11423  [pdf

    cs.NI cs.CR cs.PF

    DTLS Performance - How Expensive is Security?

    Authors: Sebastian Gallenmüller, Dominik Schöffmann, Dominik Scholz, Fabien Geyer, Georg Carle

    Abstract: Secure communication is an integral feature of many Internet services. The widely deployed TLS protects reliable transport protocols. DTLS extends TLS security services to protocols relying on plain UDP packet transport, such as VoIP or IoT applications. In this paper, we construct a model to determine the performance of generic DTLS-enabled applications. Our model considers basic network characte… ▽ More

    Submitted 25 April, 2019; originally announced April 2019.

  38. arXiv:1903.08048  [pdf, ps, other

    cs.CR cs.NI

    Multi-party authorization and conflict mediation for decentralized configuration management processes

    Authors: Holger Kinkelin, Heiko Niedermayer, Marc Müller, Georg Carle

    Abstract: Configuration management in networks with highest security demands must not depend on just one administrator and her device. Otherwise, problems can be caused by mistakes or malicious behavior of this admin, or when her computer got compromised, which allows an attacker to abuse the administrator's far-reaching permissions. Instead, we propose to use a reliable and resilient configuration manage… ▽ More

    Submitted 19 March, 2019; originally announced March 2019.

  39. Agile Network Access Control in the Container Age

    Authors: Cornelius Diekmann, Johannes Naab, Andreas Korsten, Georg Carle

    Abstract: Linux Containers, such as those managed by Docker, are an increasingly popular way to package and deploy complex applications. However, the fundamental security primitive of network access control for a distributed microservice deployment is often ignored or left to the network operations team. High-level application-specific security requirements are not appropriately enforced by low-level networ… ▽ More

    Submitted 2 March, 2019; originally announced March 2019.

    Journal ref: IEEE Transactions on Network and Service Management (2018)

  40. arXiv:1901.10664  [pdf, other

    cs.NI cs.OS

    User Space Network Drivers

    Authors: Paul Emmerich, Maximilian Pudelko, Simon Bauer, Stefan Huber, Thomas Zwickl, Georg Carle

    Abstract: The rise of user space packet processing frameworks like DPDK and netmap makes low-level code more accessible to developers and researchers. Previously, driver code was hidden in the kernel and rarely modified, or even looked at, by developers working at higher layers. These barriers are gone nowadays, yet developers still treat user space drivers as black-boxes magically accelerating applications… ▽ More

    Submitted 8 September, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: in ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2019), 2019

  41. arXiv:1901.02651  [pdf, other

    cs.CR cs.NI

    Data Querying and Access Control for Secure Multiparty Computation

    Authors: Marcel von Maltitz, Dominik Bitzer, Georg Carle

    Abstract: In the Internet of Things and smart environments data, collected from distributed sensors, is typically stored and processed by a central middleware. This allows applications to query the data they need for providing further services. However, centralization of data causes several privacy threats: The middleware becomes a third party which has to be trusted, linkage and correlation of data from di… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  42. Design of a Networked Controller for a Two-Wheeled Inverted Pendulum Robot

    Authors: Zenit Music, Fabio Molinari, Sebastian Gallenmüller, Onur Ayan, Samuele Zoppi, Wolfgang Kellerer, Georg Carle, Thomas Seel, Jörg Raisch

    Abstract: The topic of this paper is to use an intuitive model-based approach to design a networked controller for a recent benchmark scenario. The benchmark problem is to remotely control a two-wheeled inverted pendulum robot via W-LAN communication. The robot has to keep a vertical upright position. Incorporating wireless communication in the control loop introduces multiple uncertainties and affects syst… ▽ More

    Submitted 23 May, 2019; v1 submitted 7 December, 2018; originally announced December 2018.

    Comments: Submitted to IFAC Necsys 2019

  43. The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem

    Authors: Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now 33% of established connections supporting CT. With the increasing deployment o… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

    Comments: To be published at ACM IMC 2018

    Journal ref: Proceedings of the ACM Internet Measurement Conference (IMC), pp. 343-349, 2018

  44. Leveraging Secure Multiparty Computation in the Internet of Things

    Authors: Marcel von Maltitz, Georg Carle

    Abstract: Centralized systems in the Internet of Things---be it local middleware or cloud-based services---fail to fundamentally address privacy of the collected data. We propose an architecture featuring secure multiparty computation at its core in order to realize data processing systems which already incorporate support for privacy protection in the architecture.

    Submitted 6 June, 2018; originally announced June 2018.

  45. arXiv:1806.01633  [pdf, other

    cs.NI

    Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists

    Authors: Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle

    Abstract: Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In recent years, several studies have proposed the use of target lists of IPv6 addresses, called IPv6 hitlists. In this paper, we show that addresses in IPv6 hitlists are heavily clustered. We present novel techniques that… ▽ More

    Submitted 28 September, 2018; v1 submitted 5 June, 2018; originally announced June 2018.

    Comments: See https://ipv6hitlist.github.io for daily IPv6 hitlists, historical data, and additional analyses

    Journal ref: Proceedings of the 2018 Internet Measurement Conference (IMC '18)

  46. arXiv:1804.04798  [pdf, other

    cs.CR cs.NI

    Trustworthy Configuration Management for Networked Devices using Distributed Ledgers

    Authors: Holger Kinkelin, Valentin Hauner, Heiko Niedermayer, Georg Carle

    Abstract: Numerous IoT applications, like building automation or process control of industrial sites, exist today. These applications inherently have a strong connection to the physical world. Hence, IT security threats cannot only cause problems like data leaks but also safety issues which might harm people. Attacks on IT systems are not only performed by outside attackers but also insiders like administra… ▽ More

    Submitted 8 May, 2018; v1 submitted 13 April, 2018; originally announced April 2018.

    Comments: Author's version -- Final paper to appear in proceedings of 2018 IEEE/IFIP International Workshop on Decentralized Orchestration and Management of Distributed Heterogeneous Things (DOMINOS) co-located with the Network Operations and Management Symposium (NOMS)

  47. A Management Framework for Secure Multiparty Computation in Dynamic Environments

    Authors: Marcel von Maltitz, Stefan Smarzly, Holger Kinkelin, Georg Carle

    Abstract: Secure multiparty computation (SMC) is a promising technology for privacy-preserving collaborative computation. In the last years several feasibility studies have shown its practical applicability in different fields. However, it is recognized that administration and management overhead of SMC solutions are still a problem. A vital next step is the incorporation of SMC in the emerging fields of th… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

  48. A Performance and Resource Consumption Assessment of Secure Multiparty Computation

    Authors: Marcel von Maltitz, Georg Carle

    Abstract: In recent years, secure multiparty computation (SMC) advanced from a theoretical technique to a practically applicable technology. Several frameworks were proposed of which some are still actively developed. We perform a first comprehensive study of performance characteristics of SMC protocols using a promising implementation based on secret sharing, a common and state-of-the-art foundation. The… ▽ More

    Submitted 10 April, 2018; originally announced April 2018.

  49. arXiv:1802.02651  [pdf, other

    cs.NI

    Structure and Stability of Internet Top Lists

    Authors: Quirin Scheitle, Jonas Jelten, Oliver Hohlfeld, Luca Ciprian, Georg Carle

    Abstract: Active Internet measurement studies rely on a list of targets to be scanned. While probing the entire IPv4 address space is feasible for scans of limited complexity, more complex scans do not scale to measuring the full Internet. Thus, a sample of the Internet can be used instead, often in form of a "top list". The most widely used list is the Alexa Global Top1M list. Despite their prevalence, use… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: To appear at PAM'18 poster session

  50. arXiv:1711.07278  [pdf, ps, other

    cs.CR cs.OS

    Software Distribution Transparency and Auditability

    Authors: Benjamin Hof, Georg Carle

    Abstract: A large user base relies on software updates provided through package managers. This provides a unique lever for improving the security of the software update process. We propose a transparency system for software updates and implement it for a widely deployed Linux package manager, namely APT. Our system is capable of detecting targeted backdoors without producing overhead for maintainers. In add… ▽ More

    Submitted 20 November, 2017; originally announced November 2017.