Skip to main content

Showing 1–3 of 3 results for author: Ugus, O

.
  1. arXiv:2401.13306  [pdf, other

    cs.CR

    POSTER: Towards Secure 5G Infrastructures for Production Systems

    Authors: Martin Henze, Maximilian Ortmann, Thomas Vogt, Osman Ugus, Kai Hermann, Svenja Nohr, Zeren Lu, Sotiris Michaelides, Angela Massonet, Robert H. Schmitt

    Abstract: To meet the requirements of modern production, industrial communication increasingly shifts from wired fieldbus to wireless 5G communication. Besides tremendous benefits, this shift introduces severe novel risks, ranging from limited reliability over new security vulnerabilities to a lack of accountability. To address these risks, we present approaches to (i) prevent attacks through authentication… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: Accepted to the poster session of the 22nd International Conference on Applied Cryptography and Network Security (ACNS 2024)

  2. arXiv:1312.0984  [pdf, other

    cs.NI cs.CR

    TRAIL: Topology Authentication in RPL

    Authors: Heiner Perrey, Martin Landsmann, Osman Ugus, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new routing standard for the Internet of Things. Although RPL defines basic security modes, it remains vulnerable to topological attacks which facilitate blackholing, interception, and resource exhaustion. We are concerned with analyzing the corresponding threats and protecting future RPL deployments… ▽ More

    Submitted 15 December, 2015; v1 submitted 3 December, 2013; originally announced December 2013.

    ACM Class: C.2.2; C.2.6

  3. arXiv:0903.3900  [pdf, ps, other

    cs.CR cs.PF

    Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks

    Authors: Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, Sorin A. Huss

    Abstract: When deploying wireless sensor networks (WSNs) in public environments it may become necessary to secure their data storage and transmission against possible attacks such as node-compromise and eavesdrop**. The nodes feature only small computational and energy resources, thus requiring efficient algorithms. As a solution for this problem the TinyPEDS approach was proposed in [7], which utilizes… ▽ More

    Submitted 23 March, 2009; originally announced March 2009.