Stefan Köpsell

Stefan Köpsell
Verified
Stefan verified their affiliation via an institutional email.
Verified
Stefan verified their affiliation via an institutional email.
  • Dr.-Ing.
  • Researcher at Technische Universität Dresden

About

83
Publications
6,222
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,372
Citations
Current institution
Technische Universität Dresden
Current position
  • Researcher
Additional affiliations
January 2019 - present
Barkhausen Institut
Position
  • Head of Research Group

Publications

Publications (83)
Preprint
Full-text available
Integrated sensing and communication (ISAC) enables radio systems to simultaneously sense and communicate with their environment. This paper, developed within the Hexa-X-II project funded by the European Union, presents a comprehensive cross-layer vision for ISAC in 6G networks, integrating insights from physical-layer design, hardware architecture...
Conference Paper
Full-text available
Federated Learning (FL) allows clients to engage in learning without revealing their raw data. However, traditional FL focuses on developing a single global model for all clients, limiting their ability to have personalized models tailored to their specific needs. Personalized FL (PFL) enables clients to obtain their customized models, either with...
Preprint
Full-text available
We introduce a comprehensive approach to enhance the security, privacy, and sensing capabilities of integrated sensing and communications (ISAC) systems by leveraging random frequency agility (RFA) and random pulse repetition interval (PRI) agility (RPA) techniques. The combination of these techniques, which we refer to collectively as random frequ...
Preprint
Full-text available
Confidential computing in the public cloud intends to safeguard workload privacy while outsourcing infrastructure management to a cloud provider. This is achieved by executing customer workloads within so called Trusted Execution Environments (TEEs), such as Confidential Virtual Machines (CVMs), which protect them from unauthorized access by cloud...
Preprint
Full-text available
Remote attestation (RA) is the foundation for trusted execution environments in the cloud and trusted device driver onboarding in operating systems. However, RA misses a rigorous mechanized definition of its security properties in one of the strongest models, i.e., the semantic model. Such a mechanization requires the concept of State-Separating Pr...
Article
Full-text available
Eines der zentralen Spannungsfelder von IT-Sicherheit und insbesondere technischem Daten­schutz sind Störungen und deren Handhabung. Dies lässt sich vereinfachend auch wie folgt formulieren: „Das Ziel von IT-Sicherheit und Datenschutz ist das Vermeiden von Überraschungen“. Gäbe es keine Störungen, gäbe es diese Felder nicht. Vor diesem Hintergrund...
Preprint
Full-text available
Trustworthiness and trust are basic factors in common societies that allow us to interact and enjoy being in crowds without fear. As robotic devices start percolating into our daily lives they must behave as fully trustworthy objects, such that humans accept them just as we trust interacting with other people in our daily lives. How can we learn fr...
Conference Paper
Full-text available
Digital employee cards used for door access control offer benefits, but concerns about traceability, profiling and performance monitoring have led to opposition from workers' councils and employees. However, the emerging identity management approach, Self-Sovereign Identity (SSI), can address these concerns by giving control over disclosed identity...
Preprint
Full-text available
We propose LCMsec, a brokerless, decentralised Publish/Subscribe protocol. It aims to provide low-latency and high-throughput message-passing for IoT and automotive applications while providing much-needed security functionalities to combat emerging cyber-attacks in that domain. LCMsec is an extension for the Lightweight Communications and Marshall...
Preprint
Full-text available
In this paper, we develop a new methodology to provide high assurance about privacy in Cooperative Intelligent Transport Systems (C-ITS). Our focus lies on vehicle-to-everything (V2X) communications enabled by Cooperative Awareness Basic Service. Our research motivation is developed based on the analysis of unlinkability provision methods indicatin...
Preprint
Full-text available
Future industrial networks will consist of a complex mixture of new and legacy components, while new use cases and applications envisioned by Industry 4.0 will demand increased flexibility and dynamics from these networks. Industrial security gateways will become an important building block to tackle new security requirements demanded by these chan...
Preprint
Full-text available
Trends like Industry 4.0 will pose new challenges for future industrial networks. Greater interconnectedness, higher data volumes as well as new requirements for speeds as well as security will make new approaches necessary. Performanceoptimized networking techniques will be demanded to implement new use cases, like network separation and isolation...
Preprint
A growing interest in interdisciplinary research can be observed throughout the past decades. Previous work has provided general principles for facilitating collaborative work in academia, but direct interdisciplinary experiences are quite rare in the literature. In this article, we provide our insights on executing interdisciplinary research in a...
Article
Full-text available
Sixth generation systems are expected to face new security challenges, while opening up new frontiers toward context awareness in the wireless edge. The workhorse behind this projected technological leap will be a whole new set of sensing capabilities predicted for 6G devices, in addition to edge and device embedded intelligence. The combination of...
Preprint
Full-text available
Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new challenges arise for security, but also new opportunities, allowing to address current, as well as future, pressi...
Preprint
Full-text available
Sixth generation systems are expected to face new security challenges, while opening up new frontiers towards context awareness in the wireless edge. The workhorse behind this projected technological leap will be a whole new set of sensing capabilities predicted for 6G devices, in addition to the ability to achieve high precision localization. The...
Chapter
In this chapter, we present essential building blocks for developing applications in the domain of the Tactile Internet. Our building blocks belong to the fields of (i) safe, secure, and scalable computing infrastructures; (ii) world capturing and modeling; and (iii) context adaptive software and self-explanation. They cover topics, such as resourc...
Article
Industry 4.0 will revolutionize industrial automation. Yet, future smart factories will not be created from scratch. They will rather evolve from ex- isting legacy installations. Consequently, also industrial networks will evolve and the result will be a mixture of new and legacy components. This will make new security mechanisms necessary, that ar...
Chapter
The establishment of IoT devices in all areas of public and private life raises, besides many new possibilities, also a number of new privacy issues. In particular, the establishment of almost invisible audiovisual sensors, like in smart speakers or smart cars, affects not only the user who purchases these IoT devices, but all those who are within...
Article
Full-text available
Abstract The motivation for this study about Physical Layer Security comes from bridging the gap between the vast theory and a feasible implementation. We propose a Physical-Layer-Security Box as a system-level Box is a system-level solution, named PLS-Box, to solve the key exchange between two wireless communicating parties. The PLS-Box performs a...
Article
Full-text available
Abstract Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently. Cloud computing considerably reduces...
Conference Paper
Intelligent transport systems (ITS) rely on V2X communication for allowing coordination and cooperation of traffic participants and increasing traffic efficiency and safety. Communication between traffic participants needs to be secured, especially with respect to authenticity and integrity. Further, a high level of privacy-preservation needs to be...
Conference Paper
Using V2X communication in platoons promises benefits regarding energy efficiency and fleet management. It is also a safety critical process with the potential to cause dangers to life and limb which needs to be secured against attackers. We propose two protocols for secure platoon communication and provide a comparative analysis of those protocols...
Chapter
Mobile devices such as smartphones and tablets have become increasingly popular tools for Internet-based communication such as web browsing and text messaging. At the same time however, mobile devices fail to provide important privacy guarantees for their users. In particular, mobile devices per default neither conceal which services they are conta...
Preprint
We present the SecureCloud EU Horizon 2020 project, whose goal is to enable new big data applications that use sensitive data in the cloud without compromising data security and privacy. For this, SecureCloud designs and develops a layered architecture that allows for (i) the secure creation and deployment of secure micro-services; (ii) the secure...
Technical Report
Full-text available
The AN.ON-Next project aims to integrate privacy-enhancing technologies into the internet's infrastructure and establish them in the consumer mass market. The technologies in focus include a basis protection at internet service provider level, an improved overlay network-based protection and a concept for privacy protection in the emerging 5G mobil...
Conference Paper
We present the SecureCloud EU Horizon 2020 project, whose goal is to enable new big data applications that use sensitive data in the cloud without compromising data security and privacy. For this, SecureCloud designs and develops a layered architecture that allows for (i) the secure creation and deployment of secure micro-services; (ii) the secure...
Poster
Full-text available
We present the SecureCloud EU Horizon 2020 project, whose goal is to enable new big data applications that use sensitive data in the cloud without compromising data security and privacy. For this, SecureCloud designs and develops a layered architecture that allows for (i) the secure creation and deployment of secure micro-services; (ii) the secure...
Conference Paper
Privacy is a major concern on the current Internet, but transport mechanisms like IPv4 and more specifically IPv6 do not offer the necessary protection to users. However, the IPv6 address size allows designing privacy mechanisms impossible in IPv4. Nevertheless existing solutions like Privacy Extensions [20] are not optimal, still only one address...
Article
Privacy protection tools can be characterised by the number of parties that have to cooperate so that the tools work and achieve the desired effect [Pfi01]: Some privacy protection tools can be used stand-alone, without the need for the cooperation of other parties. Others require that the communication partners use the same tools. Some tools only...
Article
Full-text available
Much research and development has been done during the past couple of years to assist users in managing their partial identities in the digital world by several types of identity management [BMH05]. A comprehensive privacy-enhancing identity management system would include the following components [CK01]: an Identity Manager (IdM) on the user’s si...
Conference Paper
Full-text available
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We have analyzed the newly arising risks associated with the process of accessing and storage of the retained data and propose a secure logging system, wh...
Conference Paper
A typical consent dialog was shown in 2 x 2 x 3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a voluntary decision decrease the probability of consent---in contrast to findings in social psychology. Our data suggests that subtle positive effects of polite requests indeed...
Article
Eine Vorratsdatenspeicherung von Kommunikationsdaten schafft eine bedeutende Sicherheitslücke und beeinträchtigt schon allein dadurch die Grundrechte der Betroffenen. Dieser Sicherheitslücke muss im Rahmen des Möglichen durch gesetzliche Vorgaben wirksamer Sicherungsmaßahmen entgegengewirkt werden. Der Beitrag stellt wesentliche technische Fakten v...
Conference Paper
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we prese...
Article
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we prese...
Article
Zusammenfassung Im Rahmen eines EU TEMPUS Projektes wurde ein Ausbildungskonzept fr Datenschutz und IT-Sicherheit in der Russischen Frderation entwickelt. Die Ergebnisse des Projekts sind ein Beitrag zur internationalen Vereinheitlichung dieser Ausbildung.
Chapter
Many people have a fallacious feeling of being anonymous when surfing the Internet. But, ordinary Internet communication on the network layer is by default not anonymous because of the usage of identifying characteristics like Internet Protocol (IP) or Media Access-Control (MAC) addresses. So, if no additional measures are taken, an adversary can e...
Conference Paper
One of the heavily discussed design questions for low latency anonymity systems is: “How much additional anonymity will the system provide by adding a certain amount of delay?” But current research on this topic ignores an important aspect of this question – the influence of the delay on the number of users and by this means on the anonymity provid...
Article
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system. In contrast to other known methods, our scheme doe...
Article
Die Erfahrungen mit dem Betrieb eines Dienstes zum anonymen und unbeobachtbaren Websurfen zeigen, daß ein solcher Dienst auch in geringem Umfang zum Begehen von Straftaten mißbraucht wird. Das vorliegende Papier beschäftigt sich mit der Frage, wie eine datenschutzgerechte Deanonymisierung in solchen konkreten Einzelfällen durchgeführt werden kann,...
Conference Paper
We are developing a blocking resistant, practical and usable system for anonymous web surfing. This means, the system tries to provide as much reachability and availability as possible, even to users in countries where the free flow of information is legally, organizationally and physically restricted. The proposed solution is an add-on to existing...
Article
The development of a general-purpose request-reply anonymous communication channel by utilizing HTTP-based anonymizing tools is discussed. Such channels let clients and servers exchange messages in such a way that servers don't know the true identity of clients. The web server does not learn the true IP address of the web-browsing client. Such anon...
Conference Paper
Full-text available
Editors’ note. Following the panel discussion on Mix Cascades versus P2P at PET 2004, we invited the original panel proposers to write a summary of the discussion for the proceedings. This is their contribution. After almost two decades of research on anonymous network communication the development has forked into two main directions, namely Mix ca...
Conference Paper
While there have been made several proposals to define and measure anonymity (e.g., with information theory, formal languages and logics) unlinkability has not been modelled generally and formally. In contrast to anonymity unlinkability is not restricted to persons. In fact the unlinkability of arbitrary items can be measured. In this paper we try...
Conference Paper
Vorgestellt wird ein Bezahlsystem fur einen Mixkaskaden-basierten An- onymisierungsdienst. Es ermoglicht eine Datenvolumen-abhangige Bezahlung. Das Bezahlsystem wurde unter dem Gesichtspunkt der praktikablen Anwendbarkeit ent- worfen, d. h. es werden existierende Zahlungsmethoden genutzt und die Qualitat des Anonymisierungsdienstes wird nicht beein...
Conference Paper
Datenschutz im Internet kann nicht beim Schutz von Kommunikationsinhal- ten enden. Auch die ¨ außeren Umst¨ ande einer Kommunikation, also wer wann mit wem kommuniziert, k¨ onnen sch¨ utzenswerte personenbezogene Daten sein. Dieser Beitrag soll einen kurzen ¨ Uberblick dar¨ uber geben, welche Systeme zum Schutz dieser Da- ten speziell beim Zugriff...
Conference Paper
Based on the private message service described in [4] we show efficiency improvements of that private message service in the computational setting. Regarding an attacker which may control all but one of the queried servers we describe a private message service with a total communication complexity of blinded read between client and private message...
Chapter
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as well as flooding attacks. The core technologies include an adaptive, anonymous, time/volumesliced channel mechanism and a ticket-based authentication mechanism. The system...
Article
Dieses Papier beschreibt Verfahren, mit denen sich Angriffe der Klasse der Flooding- bzw. „n-1“-Angriffe auf Anonymisierungsdienste erkennen lassen und deren Erfolg verhindert werden kann.
Article
Full-text available
The recently introduced legislation on data retention to aid prosecuting cyber-re-lated crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We have analysed the newly arising risks associ-ated with the process of accessing and storage of the retained data and propose a se -cure logging system...
Article
Die Dissertation erläutert, wie ein Anonymisierungsdienst zu gestalten ist, so daß er für den durchschnittlichen Internetnutzer benutzbar ist. Ein Schwerpunkt dabei war die Berücksichtigung einer möglichst holistischen Sichtweise auf das Gesamtsystem "Anonymisierungsdienst". Es geht daher um die ingenieurmäßige Berücksichtigung der vielschichtigen...

Network

Cited By