Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Steinhorst, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.14983  [pdf, other

    cs.CR

    Zero-Knowledge Location Privacy via Accurate Floating Point SNARKs

    Authors: Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst

    Abstract: This paper introduces Zero-Knowledge Location Privacy (ZKLP), enabling users to prove to third parties that they are within a specified geographical region while not disclosing their exact location. ZKLP supports varying levels of granularity, allowing for customization depending on the use case. To realize ZKLP, we introduce the first set of Zero-Knowledge Proof (ZKP) circuits that are fully comp… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  2. arXiv:2401.13631  [pdf, other

    cs.NI

    Quantifying the Impact of Frame Preemption on Combined TSN Shapers

    Authors: Rubi Debnath, Philipp Hortig, Luxi Zhao, Sebastian Steinhorst

    Abstract: Different scheduling mechanisms in Time Sensitive Networking (TSN) can be integrated together to design and support complex architectures with enhanced capabilities for mixed critical networks. Integrating Frame Preemption (FP) with Credit-Based Shaper (CBS) and Gate Control List (GCL) opens up different modes and configuration choices resulting in a complex evaluation of several possibilities and… ▽ More

    Submitted 19 July, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

    Comments: Accepted in IEEE/IFIP Network Operations and Management Symposium (NOMS) 2024

  3. arXiv:2401.10664  [pdf, other

    cs.CR cs.NI

    PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis

    Authors: Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst

    Abstract: High-precision time synchronization is a vital prerequisite for many modern applications and technologies, including Smart Grids, Time-Sensitive Networking (TSN), and 5G networks. Although the Precision Time Protocol (PTP) can accomplish this requirement in trusted environments, it becomes unreliable in the presence of specific cyber attacks. Mainly, time delay attacks pose the highest threat to t… ▽ More

    Submitted 7 February, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

    Comments: Accepted at INFOCOM24

  4. arXiv:2401.04792  [pdf, other

    cs.CR

    REACT: Autonomous Intrusion Response System for Intelligent Vehicles

    Authors: Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst

    Abstract: Autonomous and connected vehicles are rapidly evolving, integrating numerous technologies and software. This progress, however, has made them appealing targets for cybersecurity attacks. As the risk of cyber threats escalates with this advancement, the focus is shifting from solely preventing these attacks to also mitigating their impact. Current solutions rely on vehicle security operation center… ▽ More

    Submitted 16 January, 2024; v1 submitted 9 January, 2024; originally announced January 2024.

    Comments: 20 pages

  5. arXiv:2312.00018  [pdf, other

    cs.CR

    Security Challenges in Autonomous Systems Design

    Authors: Mohammad Hamad, Sebastian Steinhorst

    Abstract: Autonomous systems are emerging in many application domains. With the recent advancements in artificial intelligence and machine learning, sensor technology, perception algorithms and robotics, scenarios previously requiring strong human involvement can be handled by autonomous systems. With the independence from human control, cybersecurity of such systems becomes even more critical as no human i… ▽ More

    Submitted 3 December, 2023; v1 submitted 5 November, 2023; originally announced December 2023.

  6. arXiv:2305.18545  [pdf, other

    cs.CR cs.NI

    Blockchain Censorship

    Authors: Anton Wahrstätter, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz, Arthur Gervais

    Abstract: Permissionless blockchains promise to be resilient against censorship by a single entity. This suggests that deterministic rules, and not third-party actors, are responsible for deciding if a transaction is appended to the blockchain or not. In 2022, the U.S. Office of Foreign Assets Control (OFAC) sanctioned a Bitcoin mixer and an Ethereum application, putting the neutrality of permissionless blo… ▽ More

    Submitted 2 June, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

  7. arXiv:2305.07401  [pdf, other

    cs.DC

    Reliability Analysis of Gracefully Degrading Automotive Systems

    Authors: Philipp Weiss, Ali Younessi, Sebastian Steinhorst

    Abstract: Fail-operational systems are a prerequisite for autonomous driving. Without a driver who can act as a fallback solution in a critical failure scenario, the system has to be able to mitigate failures on its own and keep critical applications operational. To reduce redundancy cost, graceful degradation can be applied by repurposing hardware resources at run-time. Critical applications can be kept op… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

  8. Quantitative Performance Comparison of Various Traffic Shapers in Time-Sensitive Networking

    Authors: Luxi Zhao, Paul Pop, Sebastian Steinhorst

    Abstract: Owning to the sub-standards being developed by IEEE Time-Sensitive Networking (TSN) Task Group, the traditional IEEE 802.1 Ethernet is enhanced to support real-time dependable communications for future time- and safety-critical applications. Several sub-standards have been recently proposed that introduce various traffic shapers (e.g., Time-Aware Shaper (TAS), Asynchronous Traffic Shaper (ATS), Cr… ▽ More

    Submitted 14 June, 2022; v1 submitted 24 March, 2021; originally announced March 2021.

    Journal ref: IEEE Transactions on Network and Service Management, 2022

  9. arXiv:2101.06137  [pdf, ps, other

    cs.CR

    Quantitative System-Level Security Verification of the IoV Infrastructure

    Authors: Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst

    Abstract: The Internet of Vehicles (IoV) equips vehicles with connectivity to the Internet and the Internet of Things (IoT) to support modern applications such as autonomous driving. However, the consolidation of complex computing domains of vehicles, the Internet, and the IoT limits the applicability of tailored security solutions. In this paper, we propose a new methodology to quantitatively verify the se… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  10. arXiv:2004.14804  [pdf, other

    cs.CR

    Real-Time Energy Monitoring in IoT-enabled Mobile Devices

    Authors: Nitin Shivaraman, Seima Saki, Zhiwei Liu, Saravanan Ramanathan, Arvind Easwaran, Sebastian Steinhorst

    Abstract: With rapid advancements in the Internet of Things (IoT) paradigm, electrical devices in the near future is expected to have IoT capabilities. This enables fine-grained tracking of individual energy consumption data of such devices, offering location-independent per-device billing. Thus, it is more fine-grained than the location-based metering of state-of-the-art infrastructure, which traditionally… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 4 pages, 6 figures, accepted DATE 2020 conference

  11. arXiv:2004.14559  [pdf, ps, other

    cs.DC cs.NI

    A Survey on Time-Sensitive Resource Allocation in the Cloud Continuum

    Authors: Saravanan Ramanathan, Nitin Shivaraman, Seima Suryasekaran, Arvind Easwaran, Etienne Borde, Sebastian Steinhorst

    Abstract: Artificial Intelligence (AI) and Internet of Things (IoT) applications are rapidly growing in today's world where they are continuously connected to the internet and process, store and exchange information among the devices and the environment. The cloud and edge platform is very crucial to these applications due to their inherent compute-intensive and resource-constrained nature. One of the forem… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 15 pages. A version submitted to Information Technology | De Gruyter

    MSC Class: 68M14 ACM Class: A.1; D.4

  12. arXiv:2004.14072  [pdf, other

    cs.NI cs.DC

    DeCoRIC: Decentralized Connected Resilient IoT Clustering

    Authors: Nitin Shivaraman, Saravanan Ramanathan, Shreejith Shanker, Arvind Easwaran, Sebastian Steinhorst

    Abstract: Maintaining peer-to-peer connectivity with low energy overhead is a key requirement for several emerging Internet of Things (IoT) applications. It is also desirable to develop such connectivity solutions for non-static network topologies, so that resilience to device failures can be fully realized. Decentralized clustering has emerged as a promising technique to address this critical challenge. Cl… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 10 pages, 8 figures, 3 tables, accepted in ICCCN 2020

  13. arXiv:1909.03297  [pdf

    cs.SE

    Virtual-Thing: Thing Description based Virtualization

    Authors: Hassib Belhaj Hassine, Ege Korkan, Sebastian Steinhorst

    Abstract: Integrating different Internet of Things devices from different manufacturers to create a mashup scenario can be a tedious and error-prone task that involves studying non-standard datasheets. A Thing Description (TD) as defined by the World Wide Web Consortium (W3C) can make such a task less complicated by providing a standardized model for describing the metadata and the interface of a Web of Thi… ▽ More

    Submitted 11 September, 2019; v1 submitted 7 September, 2019; originally announced September 2019.

    Comments: 3 pages, 2 figures

  14. arXiv:1909.03296  [pdf, other

    cs.DC cs.SE

    WoTify: A platform to bring Web of Things to your devices

    Authors: Ege Korkan, Hassib Belhaj Hassine, Verena Eileen Schlott, Sebastian Käbisch, Sebastian Steinhorst

    Abstract: The Internet of Things (IoT) has already taken off, together with many Web of Things (WoT) off-the-shelf devices, such as Philips Hue lights and platforms such as Azure IoT. These devices and platforms define their own way of describing the interactions with the devices and do not support the recently published WoT standards by World Wide Web Consortium (W3C). On the other hand, many hardware comp… ▽ More

    Submitted 7 September, 2019; originally announced September 2019.

    Comments: 6 pages, 9 figures, Second W3C Workshop on the Web of Things, 3-5 June 2019, Munich, Germany

  15. Security in Automotive Networks: Lightweight Authentication and Authorization

    Authors: Philipp Mundhenk, Andrew Paverd, Artur Mrowca, Sebastian Steinhorst, Martin Lukasiewycz, Suhaib A. Fahmy, Samarjit Chakraborty

    Abstract: With the increasing amount of interconnections between vehicles, the attack surface of internal vehicle networks is rising steeply. Although these networks are shielded against external attacks, they often do not have any internal security to protect against malicious components or adversaries who breach the network perimeter. To secure the in-vehicle network, all communicating components must be… ▽ More

    Submitted 15 March, 2017; v1 submitted 10 March, 2017; originally announced March 2017.

    Comments: Authors' preprint of an article to appear in ACM Transactions on Design Automation of Electronic Systems (ACM TODAES) 2017