Rainer Falk

Rainer Falk
Siemens · Technology

Dr.
Industrial Security, Embedded Security, 5G Security, Industrial IoT Security

About

102
Publications
25,661
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
321
Citations
Citations since 2017
5 Research Items
138 Citations
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030
Introduction
Current research interests: industrial security, embedded security, cyber security, cyberresilience, security for cyber physical systems, IoT security, industrial 5G security
Additional affiliations
June 2000 - present
Siemens
Position
  • Group Leader
Education
October 1990 - March 2000
Technische Universität München
Field of study
  • Information Technology, Electrical Engineering

Publications

Publications (102)
Conference Paper
Industrial cyber physical systems are exposed to attacks. Security standards define how such systems and the used devices can be protected against attacks (prevent). Despite all efforts to protect from attacks, it should always be assumed that attacks may happen. Security monitoring allows to detect successful attacks (detect), so that correspondin...
Conference Paper
Cyber physical systems operate and supervise physical, technical systems using information and communication technology, also called Operation Technology (OT). Cyber security solutions focus on the OT part, i.e., on the information and communication technology. The focus of cyber security is protection, detection, and respondence to cyber attacks....
Conference Paper
Full-text available
Connecting client and server applications directly via a transport connection allows the application of existing security protocols directly, as known from classical Web applications. Typically, Transport Layer Security (TLS) is applied to protect the communication link end-to-end. This approach is utilized in substation automation to protect the T...
Conference Paper
Full-text available
Cyber physical systems operate and supervise physical, technical systems using information and communication technology, also called Operation Technology (OT). Cyber security solutions focus on the OT part, i.e., on the information and communication technology. The focus of cyber security is protection, detection, and respondence to cyber attacks....
Conference Paper
Full-text available
The operation of the digital energy grid, as one of the critical infrastructures, has to cope with the need to control of increasingly fluctuating demand and generation of energy, and also to ensure the reliable transmission and distribution of centrally and decentrally generated energy. Control is accomplished by utilizing a communication infrastr...
Conference Paper
Full-text available
Critical infrastructures as backbone of the society and economy are increasingly the target of cyber attacks. These infrastructures have been isolated in the past, but are connected more and more also with external systems to allow for new and combined services. This immediately requires the protection of the communication connections to external s...
Article
Full-text available
The reliable integration of decentralized energy resources and loads into the smart energy grid and into a smart energy market is gaining more importance to cope with the increasing energy demand and the installation of renewable energy sources. Ideally, the load on the energy transmission network shall not be affected by direct energy exchange bet...
Article
Full-text available
Physical Unclonable Functions (PUF) realize the functionality of a “fingerprint” of a digital circuit. They can be used to authenticate devices without requiring a cryptographic authentication algorithm, or to determine a unique cryptographic key based on hardware-intrinsic, device-specific properties. It is also known to design PUF-based cryptogra...
Conference Paper
Full-text available
The integration of decentralized energy resources and loads into the smart energy grid and into smart market is gaining more importance to cope with the increasing demand on energy while reducing load on the energy transmission network that is not affected by energy exchange between local generation and consumption. Characteristic for the involved...
Patent
Full-text available
A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is...
Patent
A security device and a method provide a cryptographic key for a field device. The security device is connected to at least one tamper sensor which is associated with the field device and which, when a physical manipulation carried out on the field device is detected, a manipulation message is emitted. The cryptographic key is only provided to the...
Patent
A method for processing messages in a communication network, wherein messages are transmitted between network nodes of the communication network, which are each combined with test information that is verifiable to determine whether a corresponding message is admissible, where an admissible message leads to a positive test result and an inadmissible...
Patent
Full-text available
A device is configured for providing at least one secure cryptographic key for performing a cryptographic security function using a control device which requires a cryptographic key therefor. A configured key provided for the security function is selected from a first configuration memory and is tested using the read configured key whether a secure...
Patent
Full-text available
Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first node in an authentication server, the first node and the authentication server or an authentication proxy server using a predefined key derivation function t...
Patent
Full-text available
A message processing device for processing messages has at least one reception buffer, a message includes at least one authentication element and one message content. The message is received and stored in the reception buffer. A characteristic variable of a priority for security checking of the message is determined as a function of the message con...
Book
Full-text available
The Eighth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2014), held between November 16-20, 2014 in Lisbon, Portugal, continued a series of events covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion det...
Article
Full-text available
Industrial control networks, e.g., for fac-tory, process or energy automation and smart metering, are increasingly based on IT communication technologies like Ethernet, IP, and Web-Services. Security measures as authentication or cryptographic VPNs are used to protect communication links to supervising control stations and for remote service. While...
Conference Paper
Full-text available
Device authentication is a basic feature for security for automation systems and for the future Internet of Things. The design, setup and operation of a security infrastructure for the management of required device credentials as cryptographic device keys and device certificates is a huge challenge. Also access permissions defining authorized commu...
Conference Paper
Full-text available
Device authentication is a basic feature for security for automation systems and for the future Internet of Things. The design, setup and operation of a security infrastructure for the management of required device credentials as cryptographic device keys and device certificates is a huge challenge. Also access permissions defining authorized commu...
Patent
A test comment is transmitted by a test unit in the form of a data transmission via a mains supply to one or more electric components of a network. Each electric component that receives a transmitted test command transmits a test response that characterizes each electric component, in the form of a data transmission via the mains supply back to the...
Patent
Full-text available
A plug-in connector system for a data communication interface comprising a network connector and a network socket is equipped with an integrated authentication function that is independent of network communication. The authentication is undertaken independently of the data transmission or the data communication. The enabling is undertaken by a phys...
Patent
In a method for activating a destination network node (SN) to be woken up in a wireless network (1), in particular a sensor network, the destination network node (SN) is woken from a sleep operating mode if the destination network node verifies a received secret wake-up token (WUT) by a predefined test function and at least one stored wake-up token...
Patent
Full-text available
A method provides subscriber-specific activation of network-based mobility management using an authentication server. According to the method, network-based mobility management is enforced, even if the mobile terminal supports terminal-based mobility management. This gives a network provider complete control over mobility management in his network,...
Conference Paper
Full-text available
Information security is gaining increasing importance for networked control systems. Examples are industrial automation, process automation, and energy automation systems. Characteristic for all these systems is the data exchange between intelligent electronic devices – IEDs, which are used to monitor and control the operation. In energy automation...
Patent
In a control network for a rail vehicle, control units of the rail vehicle are connected to each other in a ring shape via at least two communication paths. A first control unit transmits user data via a communication path in a first direction to a second control unit and test data associated with the user data for checking the user data via anothe...
Patent
Full-text available
A method for providing an IP key, for encoding messages between a user terminal MS or a PMIP client and a home agent HA, wherein an authentication server only provides the mobile IP key when the authentication server recognizes, by a correspondingly encoded parameter, that the user terminal MS itself is not using mobile IP (PMIP).
Conference Paper
Information security is gaining increasingly more importance for real-time automation networks. Multicast communication is used widely especially on field and process level to cope with performance requirements and to ease the handling of communication peers as the destinations need not to be known by the sender. A security design must not interfer...
Article
Full-text available
Information security is gaining increasingly more importance for real-time automation networks. Multicast communication is used widely especially on field and process level to cope with performance requirements and to ease the handling of communication peers as the destinations need not to be known by the sender. A security design must not interfer...
Patent
Full-text available
After a radio link is established between a mobile subscriber terminal and an access network, to authenticate the subscriber an authentication proxy server of an intermediate network forwards at least one authentication message containing a subscriber identification between the access network and a home network of the subscriber. If authentication...
Patent
Full-text available
A device for authorizing an online service during driving in a vehicle. Contents of an online service are authorized according to the vehicle state. The device includes an electronic control unit, a graphical output apparatus, and a communication interface. A system that includes the device and a server, which is not located in the vehicle and whic...
Patent
Full-text available
A method and an arrangement are provided wherein a newly added mesh node does not require a link to the AAA server for the purpose of authentication. Authentication is carried out using a node which is already present in the mesh network and which has a link to the AAA server.
Patent
Full-text available
After a radio link is established between a mobile subscriber terminal and an access network, the subscriber is authenticated by a proxy server of an intermediate network forwarding, from the access network to a home network of the subscriber, authentication message(s) containing a subscriber identification. If the subscriber is authenticated and t...
Article
Full-text available
Rechargeable electric vehicles are receiving increasing attention from different stakeholders: from customers as gas prices are constantly rising, from car manufacturers to address customer, market, and environmental demands, and also from electric energy utilities for integrating them into smart electric grids. While in the first step, the emphasi...
Conference Paper
The Smart Grid is based on information exchange between various stakeholders using open communication technologies to control the physical electric grid through the information grid. Protection against cyber attacks is essential to ensure a reliable operation of the Smart Grid. This challenge is addressed by various regulatory, standardization, and...
Conference Paper
In aktuellen Fahrzeugen wird ein wesentlicher Teil der Fahrzeugfunktionen durch Software realisiert. Die Integration aktiv eingreifender Assistenzsysteme wird diesen Trend noch verstärken und die Komplexität des Bordnetzes wird weiter zunehmen. In diesem Artikel stellen wir einen Ansatz vor, Bordnetz und Software im Fahrzeug über eine datenzentrisc...
Conference Paper
The smart grid is based on information exchange between various stakeholders using open communication technologies to control the physical electric grid through the information grid. Protection against cyber attacks is essential to ensure a reliable operation of the smart grid. This challenge is addressed by various regulatory, standardization, and...
Conference Paper
Information security is gaining increasingly more importance for real-time industrial automation networks. Protection is not only needed against attacks originating from external networks connected as remote data access, but also from potential attacks originating from locally connected devices connected during regular operation. Relevant use...
Conference Paper
Rechargeable electric vehicles are receiving increasing attention from customers as gas prices are constantly rising, from car manufacturers to address customer, market, and environmental demands, and also from energy utilities for integrating them into smart electric grids. While in the first step the emphasis is placed on electric vehicles as ene...
Conference Paper
Full-text available
With the advent of the smart energy grid - an energy transportation and distribution network being combined with an IT network for its monitoring and control - information security has gained tremendous importance for energy distribution and energy automa- tion systems. Integrated security functionality is crucial to ensure a reliable and continuou...
Article
Full-text available
Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication servi...
Article
Steffen Fries studied information technology at the Technical University of Chemnitz, Germany. Since 1995 he has been working in the area of security technologies within Siemens Corporate Technologies. As principal engineer his main interest lies on the design and standardization of IT security concepts and solutions. Within the last couple of year...
Article
Full-text available
The industrial application of wireless sensor-actuator networks is attractive due to their flexibility, saving potential and ease of use. However, weak or missing security would restrain the acceptance and hinder a wide-spread use. This paper presents a security design for wireless sensor-actuator networks in industrial settings. The security desig...
Conference Paper
Full-text available
Using communication services like voice services, chat services and web 2.0 technologies (wikis, blogs, etc) are a common part of everyday life in a personal or business context. These communication services typically authenticate participants. Identities identify the communication peer to users of the service or to the service itself. Calling line...
Article
Full-text available
Wireless sensor-actuator networks have a big usage potential in numerous industrial use cases. They allow easy and flexible deployment of nodes for monitoring and controlling various industrial applications as for example the supervision of critical infrastructures or monitoring and control in factory and process automation. However, missing or wea...
Article
Virtualization enables the abstraction of hardware, operating systems, and networks. This can form the basis for the taking services out of store known as "cloud computing", for new architectures in customer calculators, and for more efficient calculation centers. The abstraction and separation can be used to improve the safety of information trans...
Article
Virtualisierung ermöglicht die Abstraktion von Hardware, Betriebssystemen und Netzen und bildet damit die Basis für die Auslagerungen von Diensten als "Cloud Computing", neue Architekturen auf Client-Rechnern und effizientere Rechenzentren. Die Abstraktion und Trennung kann zur Verbesserung der Sicherheit von IT-Anwendungen benutzt werden. Aber vor...
Conference Paper
The efficient and reliable handling of replacement parts is of high importance for airlines. It can be supported by attaching an RFID tag to replacement parts that stores data identifying unambiguously the replacement part and further information about its installation and maintenance. Security is essential so that only authenticated and authorized...
Conference Paper
Full-text available
Sleep deprivation attacks are still an unsolved but critical problem in sensor networks. They aim on quickly exhausting energy reserves of battery powered sensor nodes by continuously sending messages to the node, preventing the attacked node to switch to an energy saving sleep state. Sleep deprivation attacks come also in the form of sending traff...
Conference Paper
Voice is, besides email, the major personal communication technology used by employees of an enterprise. Additionally, multimedia communication is getting used more and more in the form of video conferences to decrease travel cost and support environmental protection. Besides oral communication also documents, e.g. presentations, may be shared. Thu...
Conference Paper
WiMAX networks provide broadband data access to mobile as well as stationary users. While the wireless link is based on the 802.16e-2005 specification developed by IEEE, a complete network architecture “behind the base station” with global roaming support has been specified by the WiMAX forum. The security architecture for these networks covers EAP...
Article
Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009. Athens/Glyfada, Greece, 18 - 23 June 2009 Nr.Article number 5210980, x - xi
Conference Paper
Full-text available
Fundamental differences exist between academic research on wireless sensor networks and industrial wireless sensor networks as envisaged by the BMBF-funded project ZESAN. Their requirements and underlying assumptions are described to bridge the gap between research and industrial application.
Conference Paper
Voice is, besides email, the major personal communication technology for businesses. As it is often used for sensitive conversations, an appropriate security level is of great relevance. Historically, security measures have either been targeted to prevent fraud, thereby securing the operatorpsilas business model, or to provide military-class end-to...
Conference Paper
Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID ap...
Conference Paper
Full-text available
RFID systems are an important technology that can be used for various applications as logistic processes or access control. Security is in many scenarios required to prevent manipulation and undesired disclosure of information. Symmetric cryptography is typically used in today¿s systems to protect RFID tags. In more complex and distributed environ...
Conference Paper
Distributed processing of RFID information enables new RFID applications where tags, readers and processing systems belong to different administrative domains and where multiple RFDD applications are realized using a common reader and processing infrastructure. A novel distributed RFID processing architecture supporting various future eEnabled airp...
Conference Paper
The incorporation of sensor readings into RFID tags creates a significant potential for applications which require environment monitoring as well as asset management and tracking, such as blood storage and management, and on-board aircraft part maintenance. On one hand, the environment history is essential in evaluating health and integrity of obje...
Conference Paper
Wireless communication between vehicles and with infrastructure services (Car 2 X communication) enables multifaceted attractive applications in particular for safety, traffic control, information and entertainment (Infotainment). These applications pose a manifold of security requirements. Public-key based cryptographic security mechanisms play a...
Conference Paper
RFID systems are an important technology that are used for various applications as logistic processes or access control. Today¿s systems are typically designed for a specific application and deployed by a single party. To identify security requirements for future RFID systems, an aircraft-airport scenario making quite radical assumptions is descri...
Conference Paper
Full-text available
Cognitive Pilot Channel or Common Pilot Channel (CPC) is essential in particular for cogni-tive/reconfigurable radios that support concepts such as flexible spectrum management, dynamic spectrum allocations. It simplifies and speeds up the scanning process for reconfigurable terminals that are not aware of the concurrent spectrum constellation. How...
Conference Paper
Full-text available
Authorization of premium mobility services allows offering of various services to users based on operator and user profiles. This paper describes the high level authorization architecture currently developed by the ENABLE project.
Conference Paper
Full-text available
WiMAX provides high-speed access for mobile users. While the wireless link is based on 802.16e, the network architecture is specified by the WiMAX forum. The WiMAX security architecture covers AAA-based network access authentication and secure macro mobility based on mobile IP.
Article
The Security Assertion Markup Language (SAML) standard supports the expression of security assertions such as authentication, role membership, or permissions. SAML assertions may be used to realize single-sign-on between Web servers located in different domains. After a short introduction to SAML, this article describes the application of SAML to p...
Article
Full-text available
Emerging radio access technologies such as wireless personal and metropolitan area networks and digital broadcasting are a new era for wireless communications. These standards aim at complementing existing cellular/Wi-Fi networks in order to offer a wide range of available access modes to mobile terminals. Multiradio wireless systems, referred to a...
Chapter
IntroductionApplication Scenarios for ReconfigurabilityElement Management, Flexible Air Interfaces and SDRNetwork Architecture and Support ServicesCognitive Radio, Spectrum and Radio Resource ManagementAcknowledgementReferences
Conference Paper
Full-text available
The European project " mCDN – Multimedia Content Delivery Networks " aims at an optimized and personalized content management and content delivery, being adaptive to a rich variety of clients in heterogeneous fixed-mobile networks. Security is an important issue in the mCDN project. Content and identity protection, user privacy, and also the integr...
Conference Paper
Full-text available
This paper describes the security architecture for WiMAX with a strong focus on mobile WiMAX networks as specified by the WiMAX forum. Focusing on the network security architecture including roaming scenarios rather than the plain 802.16 wireless link security, aspects like AAA-based access authentication, user versus device authentication, secure...
Article
Bootstrapping refers to the process of creating state (typically security associations, configuration and authorization information) between two or more entities based on a trust relationship between a trusted third party and two or more entities. The term bootstrapping has been recently introduced to denote solutions to configuration problems, suc...
Conference Paper
Full-text available
A central issue for reconfiguration is authorization (or certification) of reconfiguration software, defining which software is accepted from whom. A well-known and widely used security mechanism to protect software download is signed content. The paper describes how standard digital signatures based e.g. on PKCS#1 or DSA signatures and X.509 certi...
Conference Paper
Reconfiguration will only be accepted and hence become a success in the market if the security requirements of all stakeholders are satisfied adequately. Secure reconfiguration involves device protection, secure software download to defend against potentially malicious software, and secure reconfiguration signalling to prevent manipulation of the r...
Conference Paper
Full-text available
The use of relays as multi-hop extension of public networks is expected to play an important role for future mobile communication systems as they could provide simple and cost-efficient extension of coverage for access points. This paper describes the reference model, security requirements, and required security solution components to protect the a...
Conference Paper
Full-text available
Reconfiguration is the subject of many investigative activities performed by industrial consortia and collaborative research projects. In the IST End-to-End Reconfigurability (E2R) project [1], a perspective on reconfiguration is taken which is not restricted to terminals, but also takes network aspects of architecture into account. Reconfiguration...
Conference Paper
Reconfiguration is the subject of many investigative activities performed by industrial consortia and collaborative research projects. In the IST End-to-End Reconfigurability (E 2 R) project [1], a perspective on reconfiguration is taken which is not restricted to terminals, but also takes network aspects of architecture into account. Reconfigurati...
Conference Paper
Full-text available
A major goal of the European project “mCDN” is the enhancement of Content Delivery Networks (CDNs) for secure multimedia content discovery and delivery that is very well suited for converged fixed-mobile environments. This is achieved by introducing specific Web service components such as personalization, optimal content placement and discovery, pe...
Conference Paper
Full-text available
Reconfiguration allows adapting the configuration of a wireless communication device to reflect the current network conditions. When a user is roaming to different networks, this implies that the configuration if his reconfigurable device should by adapted to correspond to the currently used network. This paper describes approaches for decentralize...
Conference Paper
Full-text available
The IST-SCOUT project has developed and validated concepts for All-IP Cellular Networks supporting reconfigurable mobile equipment, with a focus on network architecture to support terminal reconfiguration, secure reconfiguration procedures, and download traffic management schemes. In this paper, we discuss these aspects of the SCOUT architecture.
Conference Paper
Full-text available
This paper investigates the security features and mechanisms required to provide global IP connectivity and various forms of mobility to a globally roaming user in a future mobile system. It also addresses the security issues related to Quality of Service signalling and terminal reconfiguration.
Conference Paper
Full-text available
The future generation of mobile communication systems will provide a diversity of services, with the means of secure software download and transparent reconfigurability, providing increased opportunity to all parties in the telecommunications value chain. In order that such a complex system can be realised and provide a comfortable, secure, yet com...