Skip to main content

Showing 1–2 of 2 results for author: Bodenhausen, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.01338  [pdf, other

    cs.NI cs.CR

    Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities

    Authors: Jörn Bodenhausen, Christian Sorgatz, Thomas Vogt, Kolja Grafflage, Sebastian Rötzel, Michael Rademacher, Martin Henze

    Abstract: Critical infrastructure constitutes the foundation of every society. While traditionally solely relying on dedicated cable-based communication, this infrastructure rapidly transforms to highly digitized and interconnected systems which increasingly rely on wireless communication. Besides providing tremendous benefits, especially affording the easy, cheap, and flexible interconnection of a large nu… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Author's version of a paper accepted for publication in Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2023)

  2. Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

    Authors: Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze

    Abstract: The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed t… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: 15 pages, 6 figures

    Journal ref: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266