Michael Rademacher

Michael Rademacher
Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE | FKIE · Cyber Analysis & Defense

Doctor of Engineering

About

29
Publications
13,988
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
156
Citations

Publications

Publications (29)
Conference Paper
Full-text available
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative approach for Internet in rural areas. The main hardware components of these networks are commercial off-the-shelf WiFi radios and directional antennas. During our experiences with real-world WiLD networks, we encountered that interference among long-distance links is a...
Article
Full-text available
The combination of Software-Defined Networking (SDN) and Wireless Mesh Network (WMN) is challenging due to the different natures of both concepts. SDN describes networks with homoge- neous, static and centralized controlled topologies. In contrast, a WMN is characterized by a dynamic and distributed network control, and adds new challenges with res...
Conference Paper
Full-text available
More and more low-power wide-area networks (LPWANs) are being deployed and planning the gateway locations plays a significant role for the network range, performance and profitability. We choose LoRa as one LPWAN technology and evaluated the accuracy of the Received Signal Strength Indication (RSSI) of different chipsets in a laboratory environment...
Conference Paper
Full-text available
WiFi-based Long Distance networks are seen as a promising alternative to bring broadband connectivity to rural areas. A key factor for the profitability of these networks is the usage of license free bands. This work quantifies the current spectrum occupancy in our testbed which covers rural and urban areas alike. The data mining is conducted on th...
Preprint
Full-text available
Reliable and secure communication is needed to further digitize public infrastructure. LPWANs operating in license-exempt bands are a promising candidate. This work address the concept of a secure LPWAN by evaluating TLS over LoRaWAN. The overhead induced by TLS in combination with the duty cycle restrictions make this combination challenging. In t...
Preprint
Full-text available
Urban LoRa networks promise to provide a cost-efficient and scalable communication backbone for smart cities. One core challenge in rolling out and operating these networks is radio network planning, i.e., precise predictions about possible new locations and their impact on network coverage. Path loss models aid in this task, but evaluating and com...
Conference Paper
Urban LoRa networks promise to provide a cost-efficient and scalable communication backbone for smart cities. One core challenge in rolling out and operating these networks is radio network planning, i.e., precise predictions about possible new locations and their impact on network coverage. Path loss models aid in this task, but evaluating and com...
Conference Paper
Full-text available
In 2008, the cryptocurrency Bitcoin, which is equivalent to the original idea of a blockchain, emerged as a new currency and revolutionized the digital exchange of value. Despite the great user and research interest, the customary practice is still complex. Poor usability and negative user experience lead to several security threats. This work exam...
Poster
Full-text available
A successful deployment and operation of smart grids depends on the reliability and security of the protocols used to gather data from the various components. This work evaluates a technique called fuzzing to investigate the security of smart grid communication protocols. Based on a structured process for fuzzing in this specific domain we develop...
Technical Report
Full-text available
This work provides a short but technical introduction to the main building blocks of a blockchain. It argues that a blockchain is not a revolutionary technology but rather a clever combination of three fields: cryptography, decentralization and game theory. In addition, it summaries the differences between a public, private and federate blockchain...
Thesis
A major problem for rural areas is the inaccessibility to affordable broadband Internet connections. In these areas distances are large, and digging a cable into the ground is extremely expensive, considering the small number of potential customers at the end of that cable. This leads to a digital divide, where urban areas enjoy a high-quality serv...
Conference Paper
Full-text available
Thermostate verbreiten sich rasant im privaten Umfeld. Ein typisches Kommunikationsprotokoll für diese Geräteklasse ist BLE. In dieser Arbeit wird eine strukturierte Sicherheitsanalyse für BLE vorgestellt. Die beschriebene Vorgehensweise kategorisiert bekannte Angriffsvektoren und beschreibt einen möglichen Aufbau für eine Analyse. Im Zuge dieser A...
Conference Paper
Full-text available
Avoiding possible interference is a key aspect to maximize the performance in Wi-Fi based Long Distance networks. In this paper we quantify self-induced interference based on data derived from our testbed and match the findings against simulations. By enhancing current simulation models with two key elements we significantly reduce the deviation be...
Chapter
Full-text available
More and more devices will be connected to the internet. Many devices are part of the so-called Internet of Things (IoT) which contains many low-power devices often powered by a battery. These devices mainly communicate with the manufacturers back-end and deliver personal data and secrets like passwords. With regard to security the developer of the...
Conference Paper
Full-text available
Two key questions motivated the work in this paper: What is the impact of different usage schemes for multiple channels in a dual-radio Wireless Mesh Network (WMN), and what is the impact of some popular WMN routing protocols on its performance. These two questions were evaluated in a small and simple real-world scenario. A major concern was reprod...
Technical Report
Full-text available
This paper describes the security mechanisms of several wireless building automation technologies, namely ZigBee, EnOcean, ZWave, KNX, FS20, and HomeMatic. It is shown that none of the technologies provides the necessary measure of security that should be expected in building automation systems. One of the conclusions drawn is that software embedde...
Conference Paper
Full-text available
Software Defined Networking (SDN) and Wireless Mesh Networks (WMNs) evolved to be sophisticated technologies used in a variety of applications. However, a combined approach called Wireless Mesh Software Defined Network (wmSDN) has not been widely addressed in the research community. Our idea in this field consists of WiFi-based point-to-point links...
Conference Paper
Full-text available
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative technology approach for providing Internet in rural areas. An important factor in network planning of these wireless networks is estimating the path loss. In this work, we present various propagation models we found suitable for point-to-point (P2P) operation in the Wi...
Conference Paper
Full-text available
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative approach for Internet in rural areas. However, the MAC layer, which is based on the IEEE802.11 standard, comprises contiguous stations in a cell and is spatially restricted to a few hundred meters at most. In this work, we summarize efforts by different researchers to...
Conference Paper
Full-text available
For the evaluation of the received signal strength indication (RSSI) a different methodology compared to previous publications is introduced in this paper by exploiting a spectral scan feature of recent Qualcomm Atheros WiFi NICs. This method is compared to driver reports and to an industrial grade spectrum analyzer. During the conducted outdoor ex...
Technical Report
Full-text available
This work describes extensions to the well-known Distributed Coordination Function (DCF) model to account for IEEE802.11n point-to-point links. The developed extensions cover adaptions to the throughput and delay estimation for this type of link as well peculiarities of hardware and implementations within the Linux Kernel. Instead of using simulati...
Conference Paper
Full-text available
With the growing potential of wireless backhaul technologies for outdoor environments and rising interest in unlicensed bands for broadband delivery, dynamic channel assignment and improved spectrum utilization is re-emerging as a research topic. In this paper we describe a centralized channel assignment optimization for our wireless backhaul archi...
Conference Paper
Full-text available
The lack of affordable broadband Internet connectivity in rural areas, especially in emerging regions, is seen as a major barrier for access to knowledge, education or government services. In order to reduce the costs of back-hauling in rural regions, often without access to a stable power grid, alternative solutions are required to provide high-ba...
Conference Paper
Full-text available
Rural areas all over the world often lacking affordable broadband Internet connectivity. High CAPEX and especially OPEX due to vast and sparsely populated areas often present an uneconomical environment for deploying traditional wireless carrier equipment. Particularly in emerging and developing countries the lack of well-trained personnel requires...
Conference Paper
Rural areas often lack affordable broadband Internet connectivity, mainly due to the CAPEX and especially the OPEX of traditional wireless carrier equipment, the vast and sparsely populated areas and, notably, the lack of trained personal. Addressing these issues we have developed a self-managed heterogeneous Wireless Back-Haul (WiBACK) architectur...

Network

Cited By

Projects

Projects (2)
Archived project
Evaluation and development of usable security mechanisms in an IoT / SmartHome context
Project
Access to communication networks is essential today for people, companies and regions – the services enable an often substantial improvement to life and work. We aim at developing technologies and solutions, which will despite restricted resources, allow to cover the broadband needs of today and tomorrow, in industrial and urban as well as in rural and developing regions. Especially regions that are less likely to be covered adequately today are in our focus. This is the case where huge distances, low population density, a lack of infrastructure and skilled labour among others often don’t allow connecting a region at reasonable cost or with the profitability needs of the private sector today. We develop solutions. Specifically with "WiBACK" (Wireless Backhaul) a technology has been created, that addresses these challenges and provides an option to close the digital gap between urban and rural regions. Efficiency, flexibility and reliability is what characterizes our technologies. The ability to provide the necessary bandwidths and service level at the same time are a sine qua non. For futher information, visit http://wiback.org or http://defutech.de