Publikationen


Suche nach „[Digital]“ hat 382 Publikationen gefunden
Suchergebnis als PDF
    DigitalAngewandte Wirtschaftswissenschaften

    Beitrag (Sammelband oder Tagungsband)

    D. Stoichescu, Leon Binder, I. Tache, P. M. Svasta, Monica I. Ciolacu

    Education 4.0 - Jump to Innovation IoT in Higher Education

    [Status: Paper accepted]

    Proceedings of the 2019 IEEE 25th International Symposium for Design and Technology in Electronic Packaging (SIITME) [Oct 23-26, 2019; Cluj-Napoca, Romania], New York, NY, USA

    2020

    DigitalAngewandte WirtschaftswissenschaftenTC Grafenau

    Beitrag (Sammelband oder Tagungsband)

    Heribert Popp, Leon Binder, Monica I. Ciolacu

    Enabling IoT in Education 4.0 with Biosensors from Wearables and Artificial Intelligence

    [Status: Paper accepted]

    Proceedings of the 2019 IEEE 25th International Symposium for Design and Technology in Electronic Packaging (SIITME) [Oct 23-26, 2019; Cluj-Napoca, Romania], New York, NY, USA

    2020

    DigitalAngewandte Naturwissenschaften und WirtschaftsingenieurwesenTAZ Spiegelau

    Patent

    F. Püschner, Günther Ruhl, J. Pohl, T. Spöttl

    Elektronisches Identifikationsdokument und Verfahren zur Herstellung eines elektronischen Identifikationsdokuments

    2019

    DigitalNachhaltigElektrotechnik und MedientechnikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Martin Schramm, D. Fiala, Laurin Dörr, Michael Heigl

    On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks

    Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (July 26-28, 2019; Prague, Czech Republic), vol. Vol. 2 (SECRYPT 2019 : 16th International Conference on Security and Cryptography)

    2019

    DOI: 10.5220/0007835600720083

    Abstract anzeigen

    For an effective protection of the communication in Wireless Sensor Networks (WSN) facing e.g. threats by quantum computers in the near future, it is necessary to examine the applicability of quantum-resistant mechanisms in this field. It is the aim of this article to survey possible candidate schemes utilizable on sensor nodes and to compare the energy consumption of a selection of freely-available software implementations using a WSN-ready Texas Instruments CC1350 LaunchPad ARM® Cortex®-M3 microcontroller board.

    DigitalNachhaltigElektrotechnik und MedientechnikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Martin Schramm, D. Fiala, Laurin Dörr, Michael Heigl

    Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks

    Proceedings of the 2019 International Electronics Communication Conference (IECC '19) [July 7-9, 2019; Okinawa, Japan]

    2019

    DOI: 10.1145/3343147.3343156

    Abstract anzeigen

    A Wireless Sensor Network (WSN) contains small sensor nodes which monitor physical or environmental conditions. WSN is an important technology for digitalization of industrial periphery and is often used in environments which are not hardened against security impacts. These networks are easy to attack due to the open communication medium and low computing resources of the applied devices. Establishing security mechanisms is difficult while taking into account low energy consumption. Low cost sensors with limited resources make the implementation of cryptographic algorithms even more challenging. For WSNs cryptographic functions are needed without high impact on energy consumption and latency. Therefore, security in WSNs is a challenging field of research. This paper compares lightweight energy-efficient key exchange protocols which are suitable for WSN. The protocols were also implemented in WSN-capable Texas Instrument boards and the energy consumption was measured during the key exchange. This paper shows that schemes have to be chosen depending on the specific network requirements and that the usage of asymmetric cryptography does not always result in a high energy consumption.

    DigitalElektrotechnik und MedientechnikInstitut ProtectIT

    Zeitschriftenartikel

    Andreas Grzemba, Karl Leidl

    Secure per Machine Learning - Wie KI die Informationssicherheit verbessern kann

    Computer & Automation (Sonderheft Safety & Security), no. Juni

    2019

    DigitalElektrotechnik und MedientechnikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Andreas Grzemba, Karl Leidl

    Cybersicherheit in industriellen Netzwerken - Intrusion Detection mit Machine Learning

    Digitaler Tagungsband zum Forum Safety & Security (8.- 10. Juli 2019, Sindelfingen)

    2019

    ISBN: 978-3-645-50185-9

    DigitalMaschinenbau und Mechatronik

    Beitrag (Sammelband oder Tagungsband)

    Jochen Hiller, R. Tutsch, M. Bartscher, U. Neuschaefer-Rube, Borges de Oliveira, F.

    Multi-Material Acceptance Testing for CT-Based Coordinate Measurement Systems

    Proceedings of the 12th International Conference on Measurement and Quality Control

    2019

    ISBN: 3030181766

    DigitalMobilTC Freyung

    Beitrag (Sammelband oder Tagungsband)

    M. Kepka Vichrová, Laura Fiegler, Wolfgang Dorner, M. Kepka, P. Hájek, Mariann Juha

    Peregrinus Silva Bohemica

    A Digital Travel Guide for Navigation Assistance

    Proceedings of the 2019 9th International Conference on Advanced Computer Information Technologies (ACIT) [June 5-7, 2019; České Budějovice, Czech Republic]

    2019

    DigitalElektrotechnik und MedientechnikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Martin Schramm, Karl Leidl, Robert Wildenauer

    Hacking an optics manufacturing machine: You don't see it coming?!

    Proceedings of SPIE 11171 (Sixth European Seminar on Precision Optics Manufacturing, 1117101 [April 9th-10th 2019, Teisnach]), Bellingham, WA, USA

    2019

    DOI: 10.1117/12.2526691

    Abstract anzeigen

    With more and more industrial devices getting inter-connected the attack surface for cyber attacks is increasing steadily. In this paper the possible approach of an attacker who got access to the office network at the Institute for Precision Manufacturing and High-Frequency Technology (IPH) to attack one of the optic machines that reside in another network segment is presented. Based on known vulnerabilities from the Common Vulnerabilities and Exposures (CVE), like the shellshock exploit or remote code execution with PsExec, for devices identified in the network, an attacker can bypass the firewall between the office network and the laboratory network and get full access to the HMI of the target machine.

    DigitalNachhaltigAngewandte Naturwissenschaften und WirtschaftsingenieurwesenIPH Teisnach

    Beitrag (Sammelband oder Tagungsband)

    Werner Bogner, Johannes Jakob, R. Sammer, Franz Xaver Röhrl, Stefan Zorn

    WR12 to planar transmission line transition on organic substrate

    Proceedings of the 49th European Microwave Conference (EuMC)/European Microwave Week (EuMW) 2019 (September 29-October 4, 2019; Paris, France)

    2019

    DigitalElektrotechnik und MedientechnikTC Freyung

    Beitrag (Sammelband oder Tagungsband)

    Rainer Pöschl, Stefan Kunze, Alexander Weinberger

    A Software Defined Radio Based Implementation for the Radio Frequency Analysis of Signals from Unmanned Aerial Systems

    Proceedings of the 29th International Conference Radioelektronika 2019 (April 16-18, 2019; Pardubice, Czech Republic)

    2019

    DigitalElektrotechnik und MedientechnikTC Freyung

    Beitrag (Sammelband oder Tagungsband)

    M. Schiefer, Stefan Kunze, Alexander Weinberger

    A GNU Radio Imprementation for Frequency Hopping Spread Spectrum Receiver Synchronization

    Proceedings of the 29th International Conference Radioelektronika 2019 (April 16-18, 2019; Pardubice, Czech Republic)

    2019

    DigitalMobilElektrotechnik und MedientechnikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Martin Schramm, D. Fiala, Michael Heigl

    A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication

    Proceedings of the IEEE Annual International Conference on Pervasive Computing and Communications Workshops (March 11-15, 2019; Kyoto, Japan)

    2019

    ISBN: 978-1-5386-9150-2

    DOI: 10.1109/PERCOMW.2019.8730749

    Abstract anzeigen

    The ubiquitous internetworking of devices in all areas of life is boosted by various trends for instance the Internet of Things. Promising technologies that can be used for such future environments come from Wireless Sensor Networks. It ensures connectivity between distributed, tiny and simple sensor nodes as well as sensor nodes and base stations in order to monitor physical or environmental conditions such as vibrations, temperature or motion. Security plays an increasingly important role in the coming decades in which attacking strategies are becoming more and more sophisticated. Contemporary cryptographic mechanisms face a great threat from quantum computers in the near future and together with Intrusion Detection Systems are hardly applicable on sensors due to strict resource constraints. Thus, in this work a future-proof lightweight and resource-aware security concept for sensor networks with a processing stage permeated filtering mechanism is proposed. A special focus in the concepts evaluation lies on the novel Magic Number filter to mitigate a special kind of Denial-of-Service attack performed on CC1350 LaunchPad ARM Cortex-M3 microcontroller boards.

    DigitalMobilElektrotechnik und MedientechnikTC Freyung

    Beitrag (Sammelband oder Tagungsband)

    Raphaela Pagany, Wolfgang Dorner, A. Weigold, Simon Graf

    Georeferencing of road infrastructure from photographs using computer vision and deep learning for road safety applications

    Proceedings of the 5th International Conference on Geographical Information Systems Theory, Applications and Management (May 3-5, 2019; Heraklion, Greece]

    2019

    DigitalMobilElektrotechnik und MedientechnikInstitut ProtectIT

    Zeitschriftenartikel

    Nicolas Tiefnig, Martin Schramm, D. Fiala, Laurin Dörr, Michael Heigl

    A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection

    Computers & Security, vol. 85, no. August, pp. 270-285

    2019

    DOI: 10.1016/j.cose.2019.05.010

    Abstract anzeigen

    The connectivity of embedded systems is increasing accompanied with thriving technology such as Internet of Things/Everything (IoT/E), Connected Cars, Smart Cities, Industry 4.0, 5G or Software-Defined Everything. Apart from the benefits of these trends, the continuous networking offers hackers a broad spectrum of attack vectors. The identification of attacks or unknown behavior through Intrusion Detection Systems (IDS) has established itself as a conducive and mandatory mechanism apart from the protection by cryptographic schemes in a holistic security eco-system. In systems where resources are valuable goods and stand in contrast to the ever increasing amount of network traffic, sampling has become a useful utility in order to detect malicious activities on a manageable amount of data. In this work an algorithm – Uncoupled MAC – is presented which secures network communication through a cryptographic scheme by uncoupled Message Authentication Codes (MAC) but as a side effect also provides IDS functionality producing alarms based on the violation of Uncoupled MAC values. Through a novel self-regulation extension, the algorithm adapts it’s sampling parameters based on the detection of malicious actions. The evaluation in a virtualized environment clearly shows that the detection rate increases over runtime for different attack scenarios. Those even cover scenarios in which intelligent attackers try to exploit the downsides of sampling.

    DigitalElektrotechnik und Medientechnik

    Beitrag (Sammelband oder Tagungsband)

    A. Paler, Andreas Fischer

    On the analogy between quantum circuit design automation and virtual network embedding

    Proceedings of 34th ACM/SIGAPP Symposium on Applied Computing (SAC'19) [April 8-12, 2019; Limassol, Cyprus], New York, NY, USA

    2019

    DOI: 10.1145/3297280.3297419

    Abstract anzeigen

    Quantum computing and network virtualisation share more similarities than it would seem on first thought: both reach their potential by using the underlying hardware as efficiently as possible - a classical computer science problem. Quantum computing research has already been focusing on key problems related to the scarcity of the quantum hardware, hoping that once scalable quantum computers will be available, quantum circuit design automation methods (QCDA) are mature. Consequently, a significant methodological apparatus exists for a technology envisioned to scale in the future. Likewise, the optimisation of resource assignment for virtual networks has received much attention in the literature. As such, any scalability improvement of virtual network embedding (VNE) would be of high practical importance in the present. There is an interesting and promising relationship between VNE and QCDA. This work introduces the possibility to use QCDA methodology for VNE, and vice versa. VNE problem instances can be modeled using the quantum circuit formalism, and we offer some basic examples. To the best of our knowledge, this is the first work that highlights this analogy.

    DigitalElektrotechnik und Medientechnik

    Beitrag (Sammelband oder Tagungsband)

    D. Bhamare, A. Kassler, Andreas Fischer

    On the Construction of Optimal Embedding Problems for Delay-Sensitive Sercice Function Chains

    [Accepted for publication]

    Proceedings of the 28th International Conference on Computer Communications and Networks (ICCCN 2019) [July 29-August 1, 2019; Valencia, Spain]

    2019

    DigitalMobilEuropan Campus Rottal-Inn

    Beitrag (Sammelband oder Tagungsband)

    L. Patane, T. Hoinville, H. Cruse, M. Schilling, A. Drimus, P. Arena, Ch.J. Dallmann, T. Krause, R. Strauss, A. Schneider, V. Dürr, J. Paskarbeit, A. Vitanza, Stefan Mátéfi-Tempfli, J. Schmitz

    Integrative Biomimetics of Autonomous Hexapedal Locomotion

    [Review paper under publication]

    Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) [November 3-8, 2019; Macau, China]

    2019

    DigitalElektrotechnik und Medientechnik

    Beitrag (Sammelband oder Tagungsband)

    H. Meer, R. Kühn, Andreas Fischer

    Modeling Security Requirements for VNE Algorithms: A Practical Approach

    Systems Modeling: Methodologies and Tools, Cham

    2019

    ISBN: 978-3-319-92378-9