Skip to main content

Showing 1–3 of 3 results for author: Vallant, H

Searching in archive cs. Search in all archives.
.
  1. Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing

    Authors: Ralph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant

    Abstract: The factories of the future require efficient interconnection of their physical machines into the cyber space to cope with the emerging need of an increased uptime of machines, higher performance rates, an improved level of productivity and a collective collaboration along the supply chain. With the rapid growth of the Internet of Things (IoT), and its application in industrial areas, the so calle… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

    Comments: 8 pages, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES '19), August 26-29, 2019, Canterbury, United Kingdom

  2. An Overview of Wireless IoT Protocol Security in the Smart Home Domain

    Authors: Stefan Marksteiner, Víctor Juan Expósito Jiménez, Heribert Vallant, Herwig Zeiner

    Abstract: While the application of IoT in smart technologies becomes more and more proliferated, the pandemonium of its protocols becomes increasingly confusing. More seriously, severe security deficiencies of these protocols become evident, as time-to- market is a key factor, which satisfaction comes at the price of a less thorough security design and testing. This applies especially to the smart home doma… ▽ More

    Submitted 22 January, 2018; originally announced January 2018.

    Comments: 8 pages, 4 figures

    Journal ref: Proceedings of the Joint 13th CTTE and 10th CMI Conference on Internet of Things Business Models, Users, and Networks, 2017

  3. Towards a Secure Smart Grid Storage Communications Gateway

    Authors: Stefan Marksteiner, Heribert Vallant

    Abstract: This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid. To do so, it defines security requirements for a communications gateway and gives detailed information and hands-on configuration advice on node and communication line security, data storage, co** with backend M2M communications pr… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: 6 pages, 2 figures

    Journal ref: Proceedings of the 2017 Smart City Symposium Prague (2017)