About
18
Publications
3,665
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
317
Citations
Publications
Publications (18)
Method for operating a smart grid including a plurality of smart meters configured to monitor at least one physical measured quantity and to provide measurement results of the at least one physical measured quantity to a central entity, includes the following steps:
partitioning the smart grid into groups of smart meters, such that each of the sma...
Smart Grids are trending towards integrating Industrial Control Systems (ICS) and other domain systems for efficient operational and maintenance activities and cost savings. However, this integration poses the challenge of modeling information in a multi technology domain such that process data (e.g. voltages) and non-process data (e.g. physical ac...
a b s t r a c t Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment. Compared to conven-tional 'encrypt – encode/decode...
The complexity of software running on wireless sensor networks has increased over the years, and the need for an over-the-air (OTA) programming tool has become prominent. The requirements for the network traffic generated by a code update and the security issues that arise from it are atypical for wireless sensor networks, thus requiring innovative...
This article provides an overview about selected security and dependability solutions for wireless sensor networks. The proposed concepts have been recently developed in the European projects UbiSecSens, Sensei and WSAN4CIP. The main focus of this article is on securing convergecast traffic, securing multicast as well as aggregation providing in-ne...
The protection of critical infrastructures provides an interesting application area for wireless sensor networks. Threats such as natural catastrophes, criminal or terrorist attacks against CIs are increasingly reported. The large-scale nature of CIs requires a scalable and low-cost technology for improving CI monitoring and surveillance. WSNs are...
Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such encoded data stream on its way to numerous receivers with a minimum investment. Compared to conventional 'encrypt - encode / decode - decrypt' approa...
Recently, several code update approaches for multi-hop sensor networks have been proposed basically addressing two orthogonal problems: security and efficient over the air reprogramming. Unfortunately, the proposed security solutions for code update mechanisms are only considering early proposed over the air reprogramming solutions like e.g. Deluge...
The use of converge-cast traffic and in-network processing to minimize the amount of transmitted data is a frequently used approach to increase the lifetime of a wireless sensor network (WSN). Consequently, when aiming at security for WSNs, one has to focus primarily on protecting this type of traffic. Some recent proposals support the encryption o...
We propose a secure and resilient WSN roadside architec- ture for intelligent transport systems which supports the two complementary services accident prevention and post- accident investigation. Our WSN security architecture is stimulated by the understanding that WSN roadside islands will only be rolled-out and used when hardware costs are close...
Data aggregation is a popular approach employed in wireless sen- sor networks (WSNs) to minimize data transmission and storage. With aggregation techniques, the monitored data is expressed in a condensed form: Therefore, instead of storing all data sensed by several nodes, the network stores a condensed value only such as the sum of these values. H...
This paper describes secure solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium and large scale WSNs are a hard but necessary goal to achieve to prepare these networks for the market. In addition, a framework is needed to be able to develop sensor networks for various applicatio...
DEMO ABSTRACT The demo presents the tiny persistent encrypted data storage (tinyPEDS). It is a distributed database for asynchronous wireless sensor networks that provides long term storage for measured data and ensures the confidentiality of the stored information. TinyPEDS is a complex middleware that integrates evolved network functionalities, a...
In multi-hop wireless sensor networks the need for remote reprogramming is created by evolving application requirements and software errors. In this context, resource-awareness, time-efficiency, and the integration of appropriate security solutions are keys to the success and acceptance of a code update mechanism. To satisfy this demand, this work...
We propose a hybrid ITS safety architecture that combines vehicle-to-vehicle communication and vehicle-to-roadside sensor communication. Opposed to dedicated roadside units, which require major investments for purchase, installation and maintenance, roadside wireless sensor and networking technology represents a cost-effective solution and can leve...