Skip to main content

Showing 1–50 of 69 results for author: Wählisch, M

Searching in archive cs. Search in all archives.
.
  1. Do CAA, CT, and DANE Interlink in Certificate Deployments? A Web PKI Measurement Study

    Authors: Pouyan Fotouhi Tehrani, Raphael Hiesgen, Teresa Lübeck, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Integrity and trust on the web build on X.509 certificates. Misuse or misissuance of these certificates threaten the Web PKI security model, which led to the development of several guarding techniques. In this paper, we study the DNS/DNSSEC records CAA and TLSA as well as CT logs from the perspective of the certificates in use. Our measurements comprise 4 million popular domains, for which we expl… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  2. arXiv:2404.15068  [pdf, other

    cs.NI

    Understanding IoT Domain Names: Analysis and Classification Using Machine Learning

    Authors: Ibrahim Ayoub, Martine S. Lenders, Benoît Ampeau, Sandoche Balakrichenan, Kinda Khawam, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we investigate the domain names of servers on the Internet that are accessed by IoT devices performing machine-to-machine communications. Using machine learning, we classify between them and domain names of servers contacted by other types of devices. By surveying past studies that used testbeds with real-world devices and using lists of top visited websites, we construct lists of d… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  3. From Files to Streams: Revisiting Web History and Exploring Potentials for Future Prospects

    Authors: Lucas Vogel, Thomas Springer, Matthias Wählisch

    Abstract: Over the last 30 years, the World Wide Web has changed significantly. In this paper, we argue that common practices to prepare web pages for delivery conflict with many efforts to present content with minimal latency, one fundamental goal that pushed changes in the WWW. To bolster our arguments, we revisit reasons that led to changes of HTTP and compare them systematically with techniques to prepa… ▽ More

    Submitted 23 March, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

  4. arXiv:2401.18053  [pdf, other

    cs.NI cs.CR

    How to Measure TLS, X.509 Certificates, and Web PKI: A Tutorial and Brief Survey

    Authors: Pouyan Fotouhi Tehrani, Eric Osterweil, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Transport Layer Security (TLS) is the base for many Internet applications and services to achieve end-to-end security. In this paper, we provide guidance on how to measure TLS deployments, including X.509 certificates and Web PKI. We introduce common data sources and tools, and systematically describe necessary steps to conduct sound measurements and data analysis. By surveying prior TLS measureme… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

  5. arXiv:2307.03649  [pdf, other

    cs.NI

    6LoRa: Full Stack IPv6 Networking with DSME-LoRa on Low Power IoT Nodes

    Authors: José Álamos, Thomas Schmidt, Matthias Waehlisch

    Abstract: Long range wireless transmission techniques such as LoRa are preferential candidates for a substantial class of IoT applications, as they avoid the complexity of multi-hop wireless forwarding. The existing network solutions for LoRa, however, are not suitable for peer-to-peer communication, which is a key requirement for many IoT applications. In this work, we propose a networking system - 6LoRa,… ▽ More

    Submitted 17 July, 2023; v1 submitted 7 July, 2023; originally announced July 2023.

    ACM Class: C.2; D.2

  6. SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots

    Authors: Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey common amplification honeypot platforms as well as the underlying methods to infer attack detection thresholds and to extract knowledge from the data. By systematical… ▽ More

    Submitted 24 April, 2023; v1 submitted 9 February, 2023; originally announced February 2023.

    Comments: camera-ready

    Journal ref: Proceedings of the IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023

  7. PUF for the Commons: Enhancing Embedded Security on the OS Level

    Authors: Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Security is essential for the Internet of Things (IoT). Cryptographic operations for authentication and encryption commonly rely on random input of high entropy and secure, tamper-resistant identities, which are difficult to obtain on constrained embedded devices. In this paper, we design and analyze a generic integration of physically unclonable functions (PUFs) into the IoT operating system RIOT… ▽ More

    Submitted 1 August, 2023; v1 submitted 17 January, 2023; originally announced January 2023.

    Comments: 18 pages, 12 figures, 3 tables

    ACM Class: D.4.6; B.8.2

  8. arXiv:2301.06804  [pdf, other

    cs.AR eess.SY

    A Review of Techniques for Ageing Detection and Monitoring on Embedded Systems

    Authors: Leandro Lanzieri, Gianluca Martino, Goerschwin Fey, Holger Schlarb, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Embedded digital devices, such as Field-Programmable Gate Arrays (FPGAs) and Systems on Chip (SoCs), are increasingly used in dependable or safety-critical systems. These commodity devices are subject to notable hardware ageing, which makes failures likely when used for an extended time. It is of vital importance to understand ageing processes and to detect hardware degradations early. In this sur… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  9. arXiv:2212.06468  [pdf, other

    cs.CL cs.DL

    Lisan: Yemeni, Iraqi, Libyan, and Sudanese Arabic Dialect Copora with Morphological Annotations

    Authors: Mustafa Jarrar, Fadi A Zaraket, Tymaa Hammouda, Daanish Masood Alavi, Martin Waahlisch

    Abstract: This article presents morphologically-annotated Yemeni, Sudanese, Iraqi, and Libyan Arabic dialects Lisan corpora. Lisan features around 1.2 million tokens. We collected the content of the corpora from several social media platforms. The Yemeni corpus (~ 1.05M tokens) was collected automatically from Twitter. The corpora of the other three dialects (~ 50K tokens each) came manually from Facebook a… ▽ More

    Submitted 17 December, 2022; v1 submitted 13 December, 2022; originally announced December 2022.

  10. On the Interplay between TLS Certificates and QUIC Performance

    Authors: Marcin Nawrocki, Pouyan Fotouhi Tehrani, Raphael Hiesgen, Jonas Mücke, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we revisit the performance of the QUIC connection setup and relate the design choices for fast and secure connections to common Web deployments. We analyze over 1M Web domains with 272k QUIC-enabled services and find two worrying results. First, current practices of creating, providing, and fetching Web certificates undermine reduced round trip times during the connection setup sinc… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: camera-ready

    Journal ref: Proc. of 18th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pp. 204--213, New York, NY, USA: ACM, 2022

  11. arXiv:2210.06236  [pdf, other

    cs.NI

    IPv6 over Bluetooth Advertisements: An alternative approach to IP over BLE

    Authors: Hauke Petersen, János Brodbeck, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The IPv6 over Bluetooth Low Energy (BLE) standard defines the transfer of IP data via BLE connections. This connection-oriented approach provides high reliability but increases packet delays and requires substantial overhead to manage BLE connections. To overcome these drawbacks we present the design and implementation of IPv6 over BLE advertisements, a standard-compliant connection-less approach.… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

  12. arXiv:2209.00965  [pdf, other

    cs.NI

    Waiting for QUIC: On the Opportunities of Passive Measurements to Understand QUIC Deployments

    Authors: Jonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Patrick Sattler, Johannes Zirngibl, Georg Carle, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we study the potentials of passive measurements to gain advanced knowledge about QUIC deployments. By analyzing one month backscatter traffic of the /9 CAIDA network telescope, we are able to make the following observations. First, we can identify different off-net deployments of hypergiants, using packet features such as QUIC source connection IDs (SCID), packet coalescence, and pa… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: preprint

  13. Delay-Tolerant ICN and Its Application to LoRa

    Authors: Peter Kietzmann, Jose Alamos, Dirk Kutscher, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Connecting long-range wireless networks to the Internet imposes challenges due to vastly longer round-trip-times (RTTs). In this paper, we present an ICN protocol framework that enables robust and efficient delay-tolerant communication to edge networks. Our approach provides ICN-idiomatic communication between networks with vastly different RTTs. We applied this framework to LoRa, enabling end-to-… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: 12 pages, 7 figures, 2 tables

  14. arXiv:2208.09281  [pdf, other

    cs.CR

    Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

    Authors: Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, Thomas Schmidt, Matthias Wählisch

    Abstract: IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to powerful accelerators supporting numerous of operations including protected key storage. An operating system should provide uniform access to these heterogeneous hardware features, which is a particular challenge in the resource constrained IoT. Effective security is tied to the usability of cryptographic… ▽ More

    Submitted 24 August, 2022; v1 submitted 19 August, 2022; originally announced August 2022.

    ACM Class: D.4.6; B.8.2; D.2.8

    Journal ref: Proceedings of ACM International Conference on Embedded Wireless Systems and Networks 2022

  15. arXiv:2207.07486  [pdf, other

    cs.NI cs.CR

    Securing name resolution in the IoT: DNS over CoAP

    Authors: Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we present the design, implementation, and analysis of DNS over CoAP (DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices. We implement different design choices of DoC in RIOT, an open-source operating system for the IoT, evaluate performance measures in a testbed, compare with DNS over UDP and DNS over DTLS, and validate our protocol desi… ▽ More

    Submitted 27 July, 2023; v1 submitted 15 July, 2022; originally announced July 2022.

    Comments: 25 pages, 15 figures, 6 tables; presented at CoNEXT 2023

    Journal ref: Proceedings of the ACM on Networking (PACMNET), Vol. 1, CoNEXT2, Article 6 (September 2023), 25 pages

  16. DSME-LoRa: Seamless Long Range Communication Between Arbitrary Nodes in the Constrained IoT

    Authors: José Álamos, Peter Kietzmann, Thomas Schmidt, Matthias Wählisch

    Abstract: Long range radio communication is preferred in many IoT deployments as it avoids the complexity of multi-hop wireless networks. LoRa is a popular, energy-efficient wireless modulation but its networking substrate LoRaWAN introduces severe limitations to its users. In this paper, we present and thoroughly analyze DSME-LoRa, a system design of LoRa with IEEE 802.15.4 DSME as a MAC layer. DSME-LoRa o… ▽ More

    Submitted 26 August, 2022; v1 submitted 28 June, 2022; originally announced June 2022.

    Comments: 44 pages (incl. References), 27 figures,8 tables

    Journal ref: ACM Transactions on Sensor Networks, Vol. 18, No. 4 (November 2022), 43 pages

  17. arXiv:2205.02544  [pdf, other

    cs.CR

    The Race to the Vulnerable: Measuring the Log4j Shell Incident

    Authors: Raphael Hiesgen, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The critical remote-code-execution (RCE) Log4Shell is a severe vulnerability that was disclosed to the public on December 10, 2021. It exploits a bug in the wide-spread Log4j library. Any service that uses the library and exposes an interface to the Internet is potentially vulnerable. In this paper, we measure the rush of scanners during the two months after the disclosure. We use several vantag… ▽ More

    Submitted 7 June, 2022; v1 submitted 5 May, 2022; originally announced May 2022.

    Comments: Proc. of Network Traffic Measurement and Analysis Conference (TMA '22), camera ready

  18. Long-Range ICN for the IoT: Exploring a LoRa System Design

    Authors: Peter Kietzmann, Jose Alamos, Dirk Kutscher, Thomas C. Schmidt, Matthias Wählisch

    Abstract: This paper presents LoRa-ICN, a comprehensive IoT networking system based on a common long-range communication layer (LoRa) combined with Information-Centric Networking (ICN) principles. We have replaced the LoRaWAN MAC layer with an IEEE 802.15.4 Deterministic and Synchronous Multi-Channel Extension (DSME). This multifaceted MAC layer allows for different map**s of ICN message semantics, which… ▽ More

    Submitted 23 April, 2022; originally announced April 2022.

    Comments: 9 pages,6 figures

  19. Secure and Authorized Client-to-Client Communication for LwM2M

    Authors: Leandro Lanzieri, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Constrained devices on the Internet of Things (IoT) continuously produce and consume data. LwM2M manages millions of these devices in a server-centric architecture, which challenges edge networks with expensive uplinks and time-sensitive use cases. In this paper, we contribute two LwM2M extensions to enable client-to-client (C2C) communication: (i) an authorization mechanism for clients, and (ii)… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

    Journal ref: Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2022

  20. WIP: Exploring DSME MAC for LoRa -- A System Integration and First Evaluation

    Authors: José Álamos, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: LoRa is a popular wireless technology that enables low-throughput (bytes) long-range communication (km) at low energy consumption (mW). Its transmission, though, is on one side prone to interference during long on-air times, and on the other side subject to duty cycle restrictions. LoRaWAN defines a MAC and a vertical stack on top of LoRa. LoRaWAN circumvents the above limitations by imposing a ce… ▽ More

    Submitted 22 April, 2022; v1 submitted 17 December, 2021; originally announced December 2021.

    Comments: 4 pages, 4 figures

  21. arXiv:2110.05160  [pdf, other

    cs.CR cs.NI

    Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope

    Authors: Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Large-scale Internet scans are a common method to identify victims of a specific attack. Stateless scanning like in ZMap has been established as an efficient approach to probing at Internet scale. Stateless scans, however, need a second phase to perform the attack, which remains invisible to network telescopes that only capture the first incoming packet and is not observed as a related event by ho… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: Proc. of 31st USENIX Security Symposium, camera-ready

  22. Transparent Forwarders: An Unnoticed Component of the Open DNS Infrastructure

    Authors: Marcin Nawrocki, Maynard Koch, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we revisit the open DNS (ODNS) infrastructure and, for the first time, systematically measure and analyze transparent forwarders, DNS components that transparently relay between stub resolvers and recursive resolvers. Our key findings include four takeaways. First, transparent forwarders contribute 26% (563k) to the current ODNS infrastructure. Unfortunately, common periodic scannin… ▽ More

    Submitted 4 November, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: Proc. of ACM CoNEXT'21, camera-ready

  23. From the Beginning: Key Transitions in the First 15 Years of DNSSEC

    Authors: Eric Osterweil, Pouyan Fotouhi Tehrani, Thomas C. Schmidt, Matthias Wählisch

    Abstract: When the global rollout of the DNS Security Extensions (DNSSEC) began in 2005, it started a first-of-its-kind trial: increasing complexity of a core Internet protocol in favor of better security for the overall Internet. The necessary cryptographic key management is made particularly challenging by DNS' loosely-federated delegation substrate and unprecedented cryptographic scale. Though fundamenta… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

    Comments: 15 pages, 14 figures

    ACM Class: C.2

    Journal ref: IEEE Transactions on Network and Service Management, Vol. 19, No. 4, pp. 5265-5283, Dec. 2022

  24. QUICsand: Quantifying QUIC Reconnaissance Scans and DoS Flooding Events

    Authors: Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we present first measurements of Internet background radiation originating from the emerging transport protocol QUIC. Our analysis is based on the UCSD network telescope, correlated with active measurements. We find that research projects dominate the QUIC scanning ecosystem but also discover traffic from non-benign sources. We argue that although QUIC has been carefully designed to… ▽ More

    Submitted 5 October, 2021; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Proc. of ACM IMC'21, camera-ready

  25. The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core

    Authors: Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data sources, bolstered by orthogonal methodologies. First, we introduce a passive attack detection method for the Internet core, i.e., at Internet eXchange Points (IXPs). Surprisingly, IXPs and honeypots observe mostly disjoint sets of attacks: 96% of IXP-inferred attacks were invisible to a sizable hon… ▽ More

    Submitted 6 October, 2021; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: Proc. of ACM IMC'21, camera-ready

  26. Reliable Firmware Updates for the Information-Centric Internet of Things

    Authors: Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Security in the Internet of Things (IoT) requires ways to regularly update firmware in the field. These demands ever increase with new, agile concepts such as security as code and should be considered a regular operation. Hosting massive firmware roll-outs present a crucial challenge for the constrained wireless environment. In this paper, we explore how information-centric networking can ease rel… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

    Journal ref: Proceedings of ACM ICN 2021

  27. arXiv:2107.07255  [pdf, other

    eess.SY cs.OS cs.SE

    PHiLIP on the HiL: Automated Multi-platform OS Testing with External Reference Devices

    Authors: Kevin Weiss, Michel Rottleuthner, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Develo** an operating system (OS) for low-end embedded devices requires continuous adaptation to new hardware architectures and components, while serviceability of features needs to be assured for each individual platform under tight resource constraints. It is challenging to design a versatile and accurate heterogeneous test environment that is agile enough to cover a continuous evolution of th… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

    ACM Class: B.8.1; D.2.5; C.3; D.4

    Journal ref: ACM Transactions on Embedded Computing Systems, Volume 20, Issue 5s, 2021

  28. arXiv:2104.01587  [pdf, other

    cs.NI

    Networking Group Content: RESTful Multiparty Access to a Data-centric Web of Things

    Authors: Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Content replication to many destinations is a common use case in the Internet of Things (IoT). The deployment of IP multicast has proven inefficient, though, due to its lack of layer-2 support by common IoT radio technologies and its synchronous end-to-end transmission, which is highly susceptible to interference. Information-centric networking (ICN) introduced hop-wise multi-party dissemination o… ▽ More

    Submitted 4 April, 2021; originally announced April 2021.

    Journal ref: Proceedings of IEEE LCN 2021

  29. arXiv:2102.10353  [pdf, other

    eess.SY cs.PF

    Dynamic Clock Reconfiguration for the Constrained IoT and its Application to Energy-efficient Networking

    Authors: Michel Rottleuthner, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Clock configuration takes a key role in tuning constrained general-purpose microcontrollers for performance, timing accuracy, and energy efficiency. Configuring the underlying clock tree, however, involves a large parameter space with complex dependencies and dynamic constraints. We argue for clock configuration as a generic operating system module that bridges the gap between highly configurable… ▽ More

    Submitted 3 August, 2022; v1 submitted 20 February, 2021; originally announced February 2021.

    ACM Class: D.4.9; B.8.2

  30. Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI

    Authors: Pouyan Fotouhi Tehrani, Eric Osterweil, Jochen H. Schiller, Thomas C. Schmidt, Matthias Wählisch

    Abstract: During disasters, crisis, and emergencies the public relies on online services provided by official authorities to receive timely alerts, trustworthy information, and access to relief programs. It is therefore crucial for the authorities to reduce risks when accessing their online services. This includes catering to secure identification of service, secure resolution of name to network service, an… ▽ More

    Submitted 13 April, 2021; v1 submitted 24 August, 2020; originally announced August 2020.

    Comments: 12 pages and 8 figures

    Journal ref: Proceedings of the Web Conference 2021 (WWW '21)

  31. A Guideline on Pseudorandom Number Generation (PRNG) in the IoT

    Authors: Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Random numbers are an essential input to many functions on the Internet of Things (IoT). Common use cases of randomness range from low-level packet transmission to advanced algorithms of artificial intelligence as well as security and trust, which heavily rely on unpredictable random sources. In the constrained IoT, though, unpredictable random sources are a challenging desire due to limited resou… ▽ More

    Submitted 14 July, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: 43 pages, 11 figures, 11 tables

    Journal ref: ACM Comput. Surv. 54, 6, Article 112 (July 2021), 38 pages

  32. arXiv:2001.08023  [pdf, other

    cs.NI

    IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison

    Authors: Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by low power lossy links and gateways that perform protocol translations. Protocols such as CoAP or MQTT-SN are degraded by the overhead of DTLS sessions, which in common deployment protect content transfer only up to the gateway. To preserve content security end-to-end via gateways and proxies, the IETF rece… ▽ More

    Submitted 16 June, 2020; v1 submitted 22 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of IFIP Networking 2020

  33. arXiv:1911.05164  [pdf, other

    cs.NI cs.CR

    A Reproducibility Study of "IP Spoofing Detection in Inter-Domain Traffic"

    Authors: Jasper Eumann, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch

    Abstract: IP spoofing enables reflection and amplification attacks, which cause major threats to the current Internet infrastructure. Detecting IP packets with incorrect source addresses would help to improve the situation. This is easy at the attacker's network, but very challenging at Internet eXchange Points (IXPs) or in transit networks. In this reproducibility study, we revisit the paper \textit{Detect… ▽ More

    Submitted 1 October, 2021; v1 submitted 12 November, 2019; originally announced November 2019.

    Comments: Extended version of a poster presented at ACM IMC 2019

    ACM Class: C.2.3; C.2.6

  34. Eco: A Hardware-Software Co-Design for In Situ Power Measurement on Low-end IoT Systems

    Authors: Michel Rottleuthner, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Energy-constrained sensor nodes can adaptively optimize their energy consumption if a continuous measurement exists. This is of particular importance in scenarios of high dynamics such as energy harvesting or adaptive task scheduling. However, self-measuring of power consumption at reasonable cost and complexity is unavailable as a generic system service. In this paper, we present Eco, a hardware-… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    ACM Class: B.8; C.4

    Journal ref: Proceedings of ENSsys 2019

  35. Bluetooth Mesh under the Microscope: How much ICN is Inside?

    Authors: Hauke Petersen, Peter Kietzmann, Cenk Gündoğan, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Bluetooth (BT) mesh is a new mode of BT operation for low-energy devices that offers group-based publish-subscribe as a network service with additional caching capabilities. These features resemble concepts of information-centric networking (ICN), and the analogy to ICN has been repeatedly drawn in the BT community. In this paper, we compare BT mesh with ICN both conceptually and in real-world exp… ▽ More

    Submitted 26 August, 2019; originally announced August 2019.

    Journal ref: Proceedings of ACM ICN 2019

  36. Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN Networks

    Authors: Cenk Gündoğan, Jakob Pfender, Michael Frey, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch

    Abstract: Quality of Service (QoS) in the IP world mainly manages forwarding resources, i.e., link capacities and buffer spaces. In addition, Information Centric Networking (ICN) offers resource dimensions such as in-network caches and forwarding state. In constrained wireless networks, these resources are scarce with a potentially high impact due to lossy radio transmission. In this paper, we explore the t… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

    Journal ref: Proceedings of ACM ICN 2019

  37. A Lesson in Scaling 6LoWPAN -- Minimal Fragment Forwarding in Lossy Networks

    Authors: Martine S. Lenders, Thomas C. Schmidt, Matthias Wählisch

    Abstract: This paper evaluates two forwarding strategies for fragmented datagrams in the IoT: hop-wise reassembly and a minimal approach to directly forward fragments. Minimal fragment forwarding is challenged by the lack of forwarding information at subsequent fragments in 6LoWPAN and thus requires additional data at nodes. We compared the two approaches in extensive experiments evaluating reliability, end… ▽ More

    Submitted 28 August, 2019; v1 submitted 20 May, 2019; originally announced May 2019.

    Comments: If you cite this paper, please use the LCN reference: M. S. Lenders, T. C. Schmidt, M. Wählisch. "A Lesson in Scaling 6LoWPAN - Minimal Fragment Forwarding in Lossy Networks." in Proc. of IEEE LCN, 2019

    Journal ref: Proceedings of IEEE LCN 2019

  38. arXiv:1902.02165  [pdf, ps, other

    cs.NI

    The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research

    Authors: Vaibhav Bajpai, Anna Brunstrom, Anja Feldmann, Wolfgang Kellerer, Aiko Pras, Henning Schulzrinne, Georgios Smaragdakis, Matthias Wählisch, Klaus Wehrle

    Abstract: Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.

    Submitted 12 January, 2019; originally announced February 2019.

    Journal ref: SIGCOMM Computer Communication Review (2019)

  39. arXiv:1901.04411  [pdf, other

    cs.NI cs.CR

    Uncovering Vulnerable Industrial Control Systems from the Internet Core

    Authors: Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.… ▽ More

    Submitted 23 April, 2020; v1 submitted 14 January, 2019; originally announced January 2019.

    Journal ref: Proceedings of 17th IEEE/IFIP Network Operations and Management Symposium (NOMS), 2020

  40. arXiv:1812.07025  [pdf, other

    cs.NI

    ICNLoWPAN -- Named-Data Networking for Low Power IoT Networks

    Authors: Cenk Gündoğan, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Information Centric Networking is considered a promising communication technology for the constrained IoT, but NDN was designed only for standard network infrastructure. In this paper, we design and evaluate an NDN convergence layer for low power lossy links that (1) augments the NDN stateful forwarding with a highly efficient name eliding, (2) devises stateless compression schemes for standard… ▽ More

    Submitted 17 December, 2018; originally announced December 2018.

  41. arXiv:1810.04645  [pdf, ps, other

    cs.NI

    Security for the Industrial IoT: The Case for Information-Centric Networking

    Authors: Michael Frey, Cenk Gündoğan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch

    Abstract: Industrial production plants traditionally include sensors for monitoring or documenting processes, and actuators for enabling corrective actions in cases of misconfigurations, failures, or dangerous events. With the advent of the IoT, embedded controllers link these `things' to local networks that often are of low power wireless kind, and are interconnected via gateways to some cloud from the glo… ▽ More

    Submitted 5 March, 2019; v1 submitted 10 October, 2018; originally announced October 2018.

    Comments: To be published at IEEE WF-IoT 2019

    Journal ref: Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), 2019

  42. The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem

    Authors: Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch

    Abstract: In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now 33% of established connections supporting CT. With the increasing deployment o… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

    Comments: To be published at ACM IMC 2018

    Journal ref: Proceedings of the ACM Internet Measurement Conference (IMC), pp. 343-349, 2018

  43. NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT

    Authors: Cenk Gündoğan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Matthias Wählisch

    Abstract: This paper takes a comprehensive view on the protocol stacks that are under debate for a future Internet of Things (IoT). It addresses the holistic question of which solution is beneficial for common IoT use cases. We deploy NDN and the two popular IP-based application protocols, CoAP and MQTT, in its different variants on a large-scale IoT testbed in single- and multi-hop scenarios. We analyze th… ▽ More

    Submitted 27 September, 2018; v1 submitted 4 June, 2018; originally announced June 2018.

    Journal ref: Proceedings of ACM ICN 2018

  44. arXiv:1801.03890  [pdf, other

    cs.NI

    HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things

    Authors: Cenk Gündoğan, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch

    Abstract: This paper revisits NDN deployment in the IoT with a special focus on the interaction of sensors and actuators. Such scenarios require high responsiveness and limited control state at the constrained nodes. We argue that the NDN request-response pattern which prevents data push is vital for IoT networks. We contribute HoP-and-Pull (HoPP), a robust publish-subscribe scheme for typical IoT scenarios… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

  45. arXiv:1801.02833  [pdf, other

    cs.NI cs.OS

    Connecting the World of Embedded Mobiles: The RIOT Approach to Ubiquitous Networking for the Internet of Things

    Authors: Martine Lenders, Peter Kietzmann, Oliver Hahm, Hauke Petersen, Cenk Gündoğan, Emmanuel Baccelli, Kaspar Schleiser, Thomas C. Schmidt, Matthias Wählisch

    Abstract: The Internet of Things (IoT) is rapidly evolving based on low-power compliant protocol standards that extend the Internet into the embedded world. Pioneering implementations have proven it is feasible to inter-network very constrained devices, but had to rely on peculiar cross-layered designs and offer a minimalistic set of features. In the long run, however, professional use and massive deploymen… ▽ More

    Submitted 9 January, 2018; originally announced January 2018.

  46. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering

    Authors: Andreas Reuter, Randy Bush, Ítalo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch

    Abstract: A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet destinations. While some networks now specify ROAs, little is known about whether other networks check routes they receive against these ROAs, a process known as Route Origin Validation (ROV). Which networks blindly accept invalid… ▽ More

    Submitted 5 May, 2018; v1 submitted 13 June, 2017; originally announced June 2017.

    ACM Class: C.2.2, C.2.3, C.2.5, C.4

    Journal ref: ACM SIGCOMM CCR 48(1) pp. 19--27, 2018

  47. arXiv:1608.06249  [pdf, other

    cs.CR cs.NI

    A Survey on Honeypot Software and Data Analysis

    Authors: Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder

    Abstract: In this survey, we give an extensive overview on honeypots. This includes not only honeypot software but also methodologies to analyse honeypot data.

    Submitted 22 August, 2016; originally announced August 2016.

    ACM Class: C.2.0; C.2.2; C.2.3; C.2.6; D.4.6; K.6.5

  48. Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection

    Authors: Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth

    Abstract: Internet service discovery is an emerging topic to study the deployment of protocols. Towards this end, our community periodically scans the entire advertised IPv4 address space. In this paper, we question this principle. Being good Internet citizens means that we should limit scan traffic to what is necessary. We conducted a study of scan data, which shows that several prefixes do not accommodate… ▽ More

    Submitted 14 September, 2016; v1 submitted 19 May, 2016; originally announced May 2016.

    Comments: 7 pages, 6 figures, 1 table. Published in Proc. of ACM IMC, 2016

    ACM Class: C.2.5; C.2.1; C.2.3

    Journal ref: Proceedings of ACM Internet Measurement Conference (IMC) 2016

  49. arXiv:1605.00618  [pdf, other

    cs.NI cs.CR cs.FL

    CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP

    Authors: Johann Schlamp, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Ernst W. Biersack

    Abstract: The Internet routing protocol BGP expresses topological reachability and policy-based decisions simultaneously in path vectors. A complete view on the Internet backbone routing is given by the collection of all valid routes, which is infeasible to obtain due to information hiding of BGP, the lack of omnipresent collection points, and data complexity. Commonly, graph-based data models are used to… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

  50. arXiv:1602.08591  [pdf, other

    cs.NI

    A Case for Time Slotted Channel Hop** for ICN in the IoT

    Authors: Oliver Hahm, Cédric Adjih, Emmanuel Baccelli, Thomas C. Schmidt, Matthias Wählisch

    Abstract: Recent proposals to simplify the operation of the IoT include the use of Information Centric Networking (ICN) paradigms. While this is promising, several challenges remain. In this paper, our core contributions (a) leverage ICN communication patterns to dynamically optimize the use of TSCH (Time Slotted Channel Hop**), a wireless link layer technology increasingly popular in the IoT, and (b) m… ▽ More

    Submitted 27 February, 2016; originally announced February 2016.

    ACM Class: C.2.2; C.4; C.2.1