Skip to main content

Showing 1–45 of 45 results for author: Wehrle, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.01809  [pdf, other

    cs.CR

    Deployment Challenges of Industrial Intrusion Detection Systems

    Authors: Konrad Wolsing, Eric Wagner, Frederik Basels, Patrick Wagner, Klaus Wehrle

    Abstract: With the escalating threats posed by cyberattacks on Industrial Control Systems (ICSs), the development of customized Industrial Intrusion Detection Systems (IIDSs) received significant attention in research. While existing literature proposes effective IIDS solutions evaluated in controlled environments, their deployment in real-world industrial settings poses several challenges. This paper highl… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  2. arXiv:2401.01022  [pdf

    cs.CR cs.CY

    An Interdisciplinary Survey on Information Flows in Supply Chains

    Authors: Jan Pennekamp, Roman Matzutt, Christopher Klinkmüller, Lennart Bader, Martin Serror, Eric Wagner, Sidra Malik, Maria Spiß, Jessica Rahn, Tan Gürpinar, Eduard Vlad, Sander J. J. Leemans, Salil S. Kanhere, Volker Stich, Klaus Wehrle

    Abstract: Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010-2021 in an interdisciplinary meta-survey to make this topic holist… ▽ More

    Submitted 28 September, 2023; originally announced January 2024.

    Journal ref: ACM Computing Surveys 56(2):1-38, 2024

  3. arXiv:2312.09660  [pdf, other

    cs.CR cs.NI

    When and How to Aggregate Message Authentication Codes on Lossy Channels?

    Authors: Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze

    Abstract: Aggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, the integrity protection of multiple messages is aggregated into a single tag. However, while such aggregation saves bandwidth, a single lost message typically means that authenticati… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: accepted at ACNS'24

  4. Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication

    Authors: Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze

    Abstract: Industrial control systems increasingly rely on middlebox functionality such as intrusion detection or in-network processing. However, traditional end-to-end security protocols interfere with the necessary access to in-flight data. While recent work on middlebox-aware end-to-end security protocols for the traditional Internet promises to address the dilemma between end-to-end security guarantees a… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: accepted at AsiaCCS'24

  5. SoK: Evaluations in Industrial Intrusion Detection Research

    Authors: Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze

    Abstract: Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Journal ref: Journal of Systems Research (JSys) Volume 3(1) 2023

  6. arXiv:2311.01060  [pdf, other

    cs.CR

    Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation

    Authors: Lennart Bader, Jan Pennekamp, Emildeon Thevaraj, Maria Spiß, Salil S. Kanhere, Klaus Wehrle

    Abstract: Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volat… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  7. Does It Spin? On the Adoption and Use of QUIC's Spin Bit

    Authors: Ike Kunze, Constantin Sander, Klaus Wehrle

    Abstract: Encrypted QUIC traffic complicates network management as traditional transport layer semantics can no longer be used for RTT or packet loss measurements. Addressing this challenge, QUIC includes an optional, carefully designed mechanism: the spin bit. While its capabilities have already been studied in test settings, its real-world usefulness and adoption are unknown. In this paper, we thus invest… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  8. ECN with QUIC: Challenges in the Wild

    Authors: Constantin Sander, Ike Kunze, Leo Blöcher, Mike Kosek, Klaus Wehrle

    Abstract: TCP and QUIC can both leverage ECN to avoid congestion loss and its retransmission overhead. However, both protocols require support of their remote endpoints and it took two decades since the initial standardization of ECN for TCP to reach 80% ECN support and more in the wild. In contrast, the QUIC standard mandates ECN support, but there are notable ambiguities that make it unclear if and how EC… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: Accepted at the ACM Internet Measurement Conference 2023 (IMC'23)

  9. Poster: Accountable Processing of Reported Street Problems

    Authors: Roman Matzutt, Jan Pennekamp, Klaus Wehrle

    Abstract: Municipalities increasingly depend on citizens to file digital reports about issues such as potholes or illegal trash dumps to improve their response time. However, the responsible authorities may be incentivized to ignore certain reports, e.g., when addressing them inflicts high costs. In this work, we explore the applicability of blockchain technology to hold authorities accountable regarding fi… ▽ More

    Submitted 24 September, 2023; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: Accepted as a poster abstract to CCS'23

  10. Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

    Authors: Markus Dahlmanns, Constantin Sander, Robin Decker, Klaus Wehrle

    Abstract: Containerization allows bundling applications and their dependencies into a single image. The containerization framework Docker eases the use of this concept and enables sharing images publicly, gaining high momentum. However, it can lead to users creating and sharing images that include private keys or API secrets-either by mistake or out of negligence. This leakage impairs the creator's security… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

    Comments: 15 pages, 7 figures

    Journal ref: In Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (ASIA CCS '23), Association for Computing Machinery, New York, NY, USA, pages 797-811

  11. Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead

    Authors: Jan Pennekamp, Anastasiia Belova, Thomas Bergs, Matthias Bodenbenner, Andreas Bührig-Polaczek, Markus Dahlmanns, Ike Kunze, Moritz Kröger, Sandra Geisler, Martin Henze, Daniel Lütticke, Benjamin Montavon, Philipp Niemietz, Lucia Ortjohann, Maximilian Rudack, Robert H. Schmitt, Uwe Vroomen, Klaus Wehrle, Michael Zeng

    Abstract: The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today's production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspec… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: Published in: Brecher, C., Schuh, G., van der Aalst, W., Jarke, M., Piller, F.T., Padberg, M. (eds) Internet of Production. Interdisciplinary Excellence Accelerator Series. Springer, Cham

  12. Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

    Authors: Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze

    Abstract: The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed t… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: 15 pages, 6 figures

    Journal ref: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266

  13. Scalable and Privacy-Focused Company-Centric Supply Chain Management

    Authors: Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, Martin Henze

    Abstract: Blockchain technology promises to overcome trust and privacy concerns inherent to centralized information sharing. However, current decentralized supply chain management systems do either not meet privacy and scalability requirements or require a trustworthy consortium, which is challenging for increasingly dynamic supply chains with constantly changing participants. In this paper, we propose CCCh… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: IEEE ICBC'22

    Journal ref: In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22)

  14. BP-MAC: Fast Authentication for Short Messages

    Authors: Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze

    Abstract: Resource-constrained devices increasingly rely on wireless communication for the reliable and low-latency transmission of short messages. However, especially the implementation of adequate integrity protection of time-critical messages places a significant burden on these devices. We address this issue by proposing BP-MAC, a fast and memory-efficient approach for computing message authentication c… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

    Comments: ACM WiSec'22

  15. A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

    Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze

    Abstract: Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations.As manually creating these behavioral models is tedious and error-prone, research focuses on machine learning to train them automatically, achieving detection rates upwards of 99%. However, these approac… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

    Comments: ACM CPSS'22

  16. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use

    Authors: Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, Martin Henze

    Abstract: Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base. Background. As part of our collaborative resear… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 16 pages, 2 figures

    Journal ref: Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), 2021, ACSAC

  17. Tracking the QUIC Spin Bit on Tofino

    Authors: Ike Kunze, Constantin Sander, Klaus Wehrle, Jan Rüth

    Abstract: QUIC offers security and privacy for modern web traffic by closely integrating encryption into its transport functionality. In this process, it hides transport layer information often used for network monitoring, thus obsoleting traditional measurement concepts. To still enable passive RTT estimations, QUIC introduces a dedicated measurement bit - the spin bit. While simple in its design, tracking… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    ACM Class: C.2.3

  18. CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Popular cryptocurrencies continue to face serious scalability issues due to their ever-growing blockchains. Thus, modern blockchain designs began to prune old blocks and rely on recent snapshots for their bootstrap** processes instead. Unfortunately, established systems are often considered incapable of adopting these improvements. In this work, we present CoinPrune, our block-pruning scheme wit… ▽ More

    Submitted 26 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2004.06911

    Journal ref: in IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3064-3078, Sept. 2021

  19. Challenges and Opportunities in Securing the Industrial Internet of Things

    Authors: Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, Klaus Wehrle

    Abstract: Given the tremendous success of the Internet of Things in interconnecting consumer devices, we observe a natural trend to likewise interconnect devices in industrial settings, referred to as Industrial Internet of Things or Industry 4.0. While this coupling of industrial components provides many benefits, it also introduces serious security challenges. Although sharing many similarities with the c… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: 12 pages, 2 figures, published in IEEE Transactions on Industrial Informatics

    Journal ref: IEEE Transactions on Industrial Informatics 17 (5), 2985-2996, 2021

  20. Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?

    Authors: Constantin Sander, Leo Blöcher, Klaus Wehrle, Jan Rüth

    Abstract: HTTP/2 and HTTP/3 avoid concurrent connections but instead multiplex requests over a single connection. Besides enabling new features, this reduces overhead and enables fair bandwidth sharing. Redundant connections should hence be a story of the past with HTTP/2. However, they still exist, potentially hindering innovation and performance. Thus, we measure their spread and analyze their causes in t… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

    Comments: Accepted at the ACM Internet Measurement Conference 2021 (IMC'21)

  21. Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM

    Authors: Constantin Sander, Ike Kunze, Klaus Wehrle, Jan Rüth

    Abstract: Congestion control is essential for the stability of the Internet and the corresponding algorithms are commonly evaluated for interoperability based on flow-rate fairness. In contrast, video conferencing software such as Zoom uses custom congestion control algorithms whose fairness behavior is mostly unknown. Aggravatingly, video conferencing has recently seen a drastic increase in use - partly ca… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Journal ref: International Conference on Passive and Active Network Measurement (PAM) 2021

  22. L, Q, R, and T -- Which Spin Bit Cousin Is Here to Stay?

    Authors: Ike Kunze, Klaus Wehrle, Jan Rüth

    Abstract: Network operators utilize traffic monitoring to locate and fix faults or performance bottlenecks. This often relies on intrinsic protocol semantics, e.g., sequence numbers, that many protocols share implicitly through their packet headers. The arrival of (almost) fully encrypted transport protocols, such as QUIC, significantly complicates this monitoring as header data is no longer visible to pass… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

  23. Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments

    Authors: Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze

    Abstract: Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are confi… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: 10 pages, 7 figures

    Journal ref: In Proceedings of the ACM Internet Measurement Conference 2020 (IMC '20). Association for Computing Machinery, New York, NY, USA, 101-110

  24. Symbolic Partial-Order Execution for Testing Multi-Threaded Programs

    Authors: Daniel Schemmel, Julian Büning, César Rodríguez, David Laprell, Klaus Wehrle

    Abstract: We describe a technique for systematic testing of multi-threaded programs. We combine Quasi-Optimal Partial-Order Reduction, a state-of-the-art technique that tackles path explosion due to interleaving non-determinism, with symbolic execution to handle data non-determinism. Our technique iteratively and exhaustively finds all executions of the program. It represents program executions using partia… ▽ More

    Submitted 22 July, 2020; v1 submitted 13 May, 2020; originally announced May 2020.

    Comments: Extended version of a paper presented at CAV'20

  25. arXiv:2004.06911  [pdf, other

    cs.CR cs.NI

    How to Securely Prune Bitcoin's Blockchain

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day. Despite the benefits of its blockchain, Bitcoin still faces serious scalability issues, most importantly its ever-increasing blockchain size. While alternative designs introduced schemes to periodically create snapshots and thereafter prune older blocks, already-deployed systems such… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 2020 IFIP Networking Conference (NETWORKING'20)

  26. Utilizing Public Blockchains for the Sybil-Resistant Bootstrap** of Distributed Anonymity Services

    Authors: Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle

    Abstract: Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrap** processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-collu… ▽ More

    Submitted 21 April, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS'20)

  27. arXiv:1911.06569  [pdf

    cs.CY

    Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Data Sensitivity

    Authors: Eva-Maria Schomakers, Chantal Lidynia, Dirk Müllmann, Roman Matzutt, Klaus Wehrle, Indra Spiecker gen. Döhmann, Martina Ziefle

    Abstract: Web 2.0, social media, cloud computing, and IoT easily connect people around the globe, overcoming time and space barriers, and offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for protecting users' privacy. From the user perspective, data disclosure depends, in part, on the perceived sensitivity of that data, and thus on a… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

  28. Perceiving QUIC: Do Users Notice or Even Care?

    Authors: Jan Rüth, Konrad Wolsing, Klaus Wehrle, Oliver Hohlfeld

    Abstract: QUIC, as the foundation for HTTP/3, is becoming an Internet reality. A plethora of studies already show that QUIC excels beyond TCP+TLS+HTTP/2. Yet, these studies compare a highly optimized QUIC Web stack against an unoptimized TCP-based stack. In this paper, we bring TCP up to speed to perform an eye-level comparison. Instead of relying on technical metrics, we perform two extensive user studies… ▽ More

    Submitted 17 October, 2019; originally announced October 2019.

    Journal ref: In CoNEXT '19: International Conference On Emerging Networking Experiments And Technologies, December 9-12, 2019, Orlando, FL, USA. ACM, New York, NY, USA, 7 pages

  29. DeePCCI: Deep Learning-based Passive Congestion Control Identification

    Authors: Constantin Sander, Jan Rüth, Oliver Hohlfeld, Klaus Wehrle

    Abstract: Transport protocols use congestion control to avoid overloading a network. Nowadays, different congestion control variants exist that influence performance. Studying their use is thus relevant, but it is hard to identify which variant is used. While passive identification approaches exist, these require detailed domain knowledge and often also rely on outdated assumptions about how congestion cont… ▽ More

    Submitted 4 July, 2019; originally announced July 2019.

    Journal ref: NetAI '19: ACM SIGCOMM 2019 Workshop on Network Meets AI & ML, August 23, 2019, Bei**g, China

  30. A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC

    Authors: Konrad Wolsing, Jan Rüth, Klaus Wehrle, Oliver Hohlfeld

    Abstract: Existing performance comparisons of QUIC and TCP compared an optimized QUIC to an unoptimized TCP stack. By neglecting available TCP improvements inherently included in QUIC, comparisons do not shed light on the performance of current web stacks. In this paper, we can show that tuning TCP parameters is not negligible and directly yields significant improvements. Nevertheless, QUIC still outperform… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Journal ref: In Proceedings of the Applied Networking Research Workshop (ANRW '19), July 22, 2019, Montreal, QC, Canada

  31. arXiv:1905.03144  [pdf, other

    cs.NI

    Blitz-starting QUIC Connections

    Authors: Jan Rüth, Konrad Wolsing, Martin Serror, Klaus Wehrle, Oliver Hohlfeld

    Abstract: In this paper, we revisit the idea to remove Slow Start from congestion control. To do so, we build upon the newly gained freedom of transport protocol extendability offered by QUIC to hint bandwidth estimates from a typical web client to a server. Using this bandwidth estimate, we bootstrap congestion windows of new connections to quickly utilize available bandwidth. This custom flow initializati… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: Technical Report, RWTH Aachen University, Chair of Communication and Distributed Systems

  32. arXiv:1904.00671  [pdf, other

    cs.NI

    Application-Agnostic Offloading of Packet Processing

    Authors: Oliver Hohlfeld, Helge Reelfs, Jan Rüth, Florian Schmidt, Torsten Zimmermann, Jens Hiller, Klaus Wehrle

    Abstract: As network speed increases, servers struggle to serve all requests directed at them. This challenge is rooted in a partitioned data path where the split between the kernel space networking stack and user space applications induces overheads. To address this challenge, we propose Santa, a new architecture to optimize the data path by enabling server applications to partially offload packet processi… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Comments: Technical Report, RWTH Aachen University, Chair of Communication and Distributed Systems

  33. arXiv:1902.02165  [pdf, ps, other

    cs.NI

    The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research

    Authors: Vaibhav Bajpai, Anna Brunstrom, Anja Feldmann, Wolfgang Kellerer, Aiko Pras, Henning Schulzrinne, Georgios Smaragdakis, Matthias Wählisch, Klaus Wehrle

    Abstract: Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.

    Submitted 12 January, 2019; originally announced February 2019.

    Journal ref: SIGCOMM Computer Communication Review (2019)

  34. Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution

    Authors: Felix Rath, Daniel Schemmel, Klaus Wehrle

    Abstract: The main reason for the standardization of network protocols, like QUIC, is to ensure interoperability between implementations, which poses a challenging task. Manual tests are currently used to test the different existing implementations for interoperability, but given the complex nature of network protocols, it is hard to cover all possible edge cases. State-of-the-art automated software testi… ▽ More

    Submitted 29 November, 2018; originally announced November 2018.

    Comments: 6 pages

  35. Is the Web ready for HTTP/2 Server Push?

    Authors: Torsten Zimmermann, Benedikt Wolters, Oliver Hohlfeld, Klaus Wehrle

    Abstract: HTTP/2 supersedes HTTP/1.1 to tackle the performance challenges of the modern Web. A highly anticipated feature is Server Push, enabling servers to send data without explicit client requests, thus potentially saving time. Although guidelines on how to use Server Push emerged, measurements have shown that it can easily be used in a suboptimal way and hurt instead of improving performance. We thus t… ▽ More

    Submitted 12 October, 2018; originally announced October 2018.

    Comments: More information available at https://push.netray.io

    Journal ref: Torsten Zimmermann, Benedikt Wolters, Oliver Hohlfeld, Klaus Wehrle. 2018. Is the Web ready for HTTP/2 Server Push?. In CoNEXT '18, December 4-7, 2018, Heraklion, Greece. ACM, New York, NY, USA, 7 pages

  36. Complying with Data Handling Requirements in Cloud Storage Systems

    Authors: Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle

    Abstract: In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today's cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and priva… ▽ More

    Submitted 7 June, 2020; v1 submitted 29 June, 2018; originally announced June 2018.

    Comments: 14 pages, 11 figures; revised manuscript, accepted for publication in IEEE Transactions on Cloud Computing

  37. arXiv:1607.03239  [pdf, other

    cs.NI cs.CR cs.DC

    The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud

    Authors: Martin Henze, René Hummen, Roman Matzutt, Klaus Wehrle

    Abstract: The increasing deployment of sensor networks, ranging from home networks to industrial automation, leads to a similarly growing demand for storing and processing the collected sensor data. To satisfy this demand, the most promising approach to date is the utilization of the dynamically scalable, on-demand resources made available via the cloud computing paradigm. However, prevalent security and pr… ▽ More

    Submitted 12 July, 2016; originally announced July 2016.

    Comments: 19 pages, 1 figure, published as technical report of the Department of Computer Science of RWTH Aachen University

    Report number: AIB-2016-06

  38. arXiv:1606.08646  [pdf, other

    cs.IT

    Finite Blocklength Performance of Multi-Terminal Wireless Industrial Networks

    Authors: Yulin Hu, Martin Serror, Klaus Wehrle, James Gross

    Abstract: This work focuses on the performance of multi-terminal wireless industrial networks, where the transmissions of all terminals are required to be scheduled within a tight deadline. The transmissions thus share a fixed amount of resources, i.e., symbols, while facing short blocklengths due to the low-latency requirement. We investigate two distinct relaying strategies, namely best relay selection am… ▽ More

    Submitted 28 June, 2016; originally announced June 2016.

  39. arXiv:1505.07683  [pdf

    cs.CR cs.CY

    Privacy in the Internet of Things: Threats and Challenges

    Authors: Jan Henrik Ziegeldorf, Oscar Garcia Morchon, Klaus Wehrle

    Abstract: The Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet infrastructure. The Internet of Things is, thus, the evolution of the Internet to cover the real-world, enabling many new services that will improve people's everyday lives, spawn new businesses and make buildings, cities and transport smarter. Smart things a… ▽ More

    Submitted 28 May, 2015; originally announced May 2015.

    Comments: Security & Communications Networks 2014

  40. User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things

    Authors: Martin Henze, Lars Hermerschmidt, Daniel Kerpen, Roger Häußling, Bernhard Rumpe, Klaus Wehrle

    Abstract: Internet of Things devices are envisioned to penetrate essentially all aspects of life, including homes and urbanspaces, in use cases such as health care, assisted living, and smart cities. One often proposed solution for dealing with the massive amount of data collected by these devices and offering services on top of them is the federation of the Internet of Things and cloud computing. However,… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 6 pages, 2 figures, 1 listing. The 2nd International Conference on Future Internet of Things and Cloud (FiCloud-2014)

  41. arXiv:1412.2257  [pdf, other

    cs.NI

    HotBox: Testing Temperature Effects in Sensor Networks

    Authors: Florian Schmidt, Matteo Ceriotti, Niklas Hauser, Klaus Wehrle

    Abstract: Low-power wireless networks, especially in outside deployments, are exposed to a wide range of temperatures. The detrimental effect of high temperatures on communication quality is well known. To investigate these influences under controlled conditions, we present HotBox, a solution with the following properties: (1) It allows exposition of sensor motes to a wide range of temperatures with a high… ▽ More

    Submitted 6 December, 2014; originally announced December 2014.

    Comments: 18 pages, 6 figures, published as technical report of the Department of Computer Science of RWTH Aachen University

    Report number: AIB-2014-14 ACM Class: C.2.1

  42. POSTER: Privacy-preserving Indoor Localization

    Authors: Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze, Klaus Wehrle

    Abstract: Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose the details of the system, e.g., sophisticated classification models. We show how Secure Two-Party Computation can be used to reconcile privacy int… ▽ More

    Submitted 13 October, 2014; originally announced October 2014.

    Comments: Poster Session of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'14)

  43. arXiv:1409.0994  [pdf, other

    cs.NI

    Enabling Distributed Simulation of OMNeT++ INET Models

    Authors: Mirko Stoffers, Ralf Bettermann, James Gross, Klaus Wehrle

    Abstract: Parallel and distributed simulation have been extensively researched for a long time. Nevertheless, many simulation models are still executed sequentially. We attribute this to the fact that many of those models are simply not capable of being executed in parallel since they violate particular constraints. In this paper, we analyze the INET model suite, which enables network simulation in OMNeT++,… ▽ More

    Submitted 3 September, 2014; originally announced September 2014.

    Comments: Published in: A. Förster, C. Sommer, T. Steinbach, M. Wählisch (Eds.), Proc. of 1st OMNeT++ Community Summit, Hamburg, Germany, September 2, 2014, arXiv:1409.0093, 2014

    Report number: OMNET/2014/04

  44. arXiv:1312.5892  [pdf, other

    cs.NI cs.IT cs.OS

    Support for Error Tolerance in the Real-Time Transport Protocol

    Authors: Florian Schmidt, David Orlea, Klaus Wehrle

    Abstract: Streaming applications often tolerate bit errors in their received data well. This is contrasted by the enforcement of correctness of the packet headers and payload by network protocols. We investigate a solution for the Real-time Transport Protocol (RTP) that is tolerant to errors by accepting erroneous data. It passes potentially corrupted stream data payloads to the codecs. If errors occur in t… ▽ More

    Submitted 20 December, 2013; originally announced December 2013.

    Comments: 18 pages, 9 figures, published as technical report of the Department of Computer Science of RWTH Aachen University

    Report number: AIB-2013-19 ACM Class: C.2.2

  45. arXiv:1310.6542  [pdf, other

    cs.DC cs.CR cs.CY cs.SE

    SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators

    Authors: Michael Eggert, Roger Häußling, Martin Henze, Lars Hermerschmidt, René Hummen, Daniel Kerpen, Antonio Navarro Pérez, Bernhard Rumpe, Dirk Thißen, Klaus Wehrle

    Abstract: Although Cloud Computing promises to lower IT costs and increase users' productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data. To lower scepticism, the project SensorCloud investigates techniques to understand and compensate these adoption barriers in a scenario consisting of cloud applications that… ▽ More

    Submitted 25 October, 2013; v1 submitted 24 October, 2013; originally announced October 2013.

    Comments: 14 pages, 3 figures, published as technical report of the Department of Computer Science of RWTH Aachen University

    Report number: AIB-2013-13