Skip to main content

Showing 1–12 of 12 results for author: Gündogan, C

.
  1. arXiv:2207.07486  [pdf, other

    cs.NI cs.CR

    Securing name resolution in the IoT: DNS over CoAP

    Authors: Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we present the design, implementation, and analysis of DNS over CoAP (DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices. We implement different design choices of DoC in RIOT, an open-source operating system for the IoT, evaluate performance measures in a testbed, compare with DNS over UDP and DNS over DTLS, and validate our protocol desi… ▽ More

    Submitted 27 July, 2023; v1 submitted 15 July, 2022; originally announced July 2022.

    Comments: 25 pages, 15 figures, 6 tables; presented at CoNEXT 2023

    Journal ref: Proceedings of the ACM on Networking (PACMNET), Vol. 1, CoNEXT2, Article 6 (September 2023), 25 pages

  2. Reliable Firmware Updates for the Information-Centric Internet of Things

    Authors: Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Security in the Internet of Things (IoT) requires ways to regularly update firmware in the field. These demands ever increase with new, agile concepts such as security as code and should be considered a regular operation. Hosting massive firmware roll-outs present a crucial challenge for the constrained wireless environment. In this paper, we explore how information-centric networking can ease rel… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

    Journal ref: Proceedings of ACM ICN 2021

  3. arXiv:2104.01587  [pdf, other

    cs.NI

    Networking Group Content: RESTful Multiparty Access to a Data-centric Web of Things

    Authors: Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Content replication to many destinations is a common use case in the Internet of Things (IoT). The deployment of IP multicast has proven inefficient, though, due to its lack of layer-2 support by common IoT radio technologies and its synchronous end-to-end transmission, which is highly susceptible to interference. Information-centric networking (ICN) introduced hop-wise multi-party dissemination o… ▽ More

    Submitted 4 April, 2021; originally announced April 2021.

    Journal ref: Proceedings of IEEE LCN 2021

  4. arXiv:2007.07753  [pdf, other

    cs.CY cs.CR cs.DC cs.IR cs.NI

    NERD: Neural Network for Edict of Risky Data Streams

    Authors: Sandro Passarelli, Cem Gündogan, Lars Stiemert, Matthias Schopp, Peter Hillmann

    Abstract: Cyber incidents can have a wide range of cause from a simple connection loss to an insistent attack. Once a potential cyber security incidents and system failures have been identified, deciding how to proceed is often complex. Especially, if the real cause is not directly in detail determinable. Therefore, we developed the concept of a Cyber Incident Handling Support System. The developed system i… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

  5. arXiv:2001.08023  [pdf, other

    cs.NI

    IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison

    Authors: Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by low power lossy links and gateways that perform protocol translations. Protocols such as CoAP or MQTT-SN are degraded by the overhead of DTLS sessions, which in common deployment protect content transfer only up to the gateway. To preserve content security end-to-end via gateways and proxies, the IETF rece… ▽ More

    Submitted 16 June, 2020; v1 submitted 22 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of IFIP Networking 2020

  6. Bluetooth Mesh under the Microscope: How much ICN is Inside?

    Authors: Hauke Petersen, Peter Kietzmann, Cenk Gündoğan, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Bluetooth (BT) mesh is a new mode of BT operation for low-energy devices that offers group-based publish-subscribe as a network service with additional caching capabilities. These features resemble concepts of information-centric networking (ICN), and the analogy to ICN has been repeatedly drawn in the BT community. In this paper, we compare BT mesh with ICN both conceptually and in real-world exp… ▽ More

    Submitted 26 August, 2019; originally announced August 2019.

    Journal ref: Proceedings of ACM ICN 2019

  7. Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN Networks

    Authors: Cenk Gündoğan, Jakob Pfender, Michael Frey, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch

    Abstract: Quality of Service (QoS) in the IP world mainly manages forwarding resources, i.e., link capacities and buffer spaces. In addition, Information Centric Networking (ICN) offers resource dimensions such as in-network caches and forwarding state. In constrained wireless networks, these resources are scarce with a potentially high impact due to lossy radio transmission. In this paper, we explore the t… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

    Journal ref: Proceedings of ACM ICN 2019

  8. arXiv:1812.07025  [pdf, other

    cs.NI

    ICNLoWPAN -- Named-Data Networking for Low Power IoT Networks

    Authors: Cenk Gündoğan, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Information Centric Networking is considered a promising communication technology for the constrained IoT, but NDN was designed only for standard network infrastructure. In this paper, we design and evaluate an NDN convergence layer for low power lossy links that (1) augments the NDN stateful forwarding with a highly efficient name eliding, (2) devises stateless compression schemes for standard… ▽ More

    Submitted 17 December, 2018; originally announced December 2018.

  9. arXiv:1810.04645  [pdf, ps, other

    cs.NI

    Security for the Industrial IoT: The Case for Information-Centric Networking

    Authors: Michael Frey, Cenk Gündoğan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch

    Abstract: Industrial production plants traditionally include sensors for monitoring or documenting processes, and actuators for enabling corrective actions in cases of misconfigurations, failures, or dangerous events. With the advent of the IoT, embedded controllers link these `things' to local networks that often are of low power wireless kind, and are interconnected via gateways to some cloud from the glo… ▽ More

    Submitted 5 March, 2019; v1 submitted 10 October, 2018; originally announced October 2018.

    Comments: To be published at IEEE WF-IoT 2019

    Journal ref: Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), 2019

  10. NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT

    Authors: Cenk Gündoğan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Matthias Wählisch

    Abstract: This paper takes a comprehensive view on the protocol stacks that are under debate for a future Internet of Things (IoT). It addresses the holistic question of which solution is beneficial for common IoT use cases. We deploy NDN and the two popular IP-based application protocols, CoAP and MQTT, in its different variants on a large-scale IoT testbed in single- and multi-hop scenarios. We analyze th… ▽ More

    Submitted 27 September, 2018; v1 submitted 4 June, 2018; originally announced June 2018.

    Journal ref: Proceedings of ACM ICN 2018

  11. arXiv:1801.03890  [pdf, other

    cs.NI

    HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things

    Authors: Cenk Gündoğan, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: This paper revisits NDN deployment in the IoT with a special focus on the interaction of sensors and actuators. Such scenarios require high responsiveness and limited control state at the constrained nodes. We argue that the NDN request-response pattern which prevents data push is vital for IoT networks. We contribute HoP-and-Pull (HoPP), a robust publish-subscribe scheme for typical IoT scenarios… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

  12. arXiv:1801.02833  [pdf, other

    cs.NI cs.OS

    Connecting the World of Embedded Mobiles: The RIOT Approach to Ubiquitous Networking for the Internet of Things

    Authors: Martine Lenders, Peter Kietzmann, Oliver Hahm, Hauke Petersen, Cenk Gündoğan, Emmanuel Baccelli, Kaspar Schleiser, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The Internet of Things (IoT) is rapidly evolving based on low-power compliant protocol standards that extend the Internet into the embedded world. Pioneering implementations have proven it is feasible to inter-network very constrained devices, but had to rely on peculiar cross-layered designs and offer a minimalistic set of features. In the long run, however, professional use and massive deploymen… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.