Solutions

The goal of this project area is to provide cryptography-based security solutions that match all the necessary functional requirements to establish trust in new and next generation computing environments. Such solutions have been and will be indispensable to establish trust in the identities and properties of actors, in the soundness of their devices, and in the proper functioning and privacy-friendliness of services.

S1 - Scalable Trust Infrastructures

The goal of S1 is to advance computational trust for the benefit of cryptography. Probabilistic trust values will be computed and continuously managed in concert with cryptographic solutions, reflecting the trustworthiness of cryptographic objects, and linked to various entities. The differentiation of trust contexts shall be supported. The project builds on two fundamental concepts of human trust: (A) personal encounters, and (B) the propagation of trust from acquaintances to communities. The project thus develop concepts coined as (A) situated trust and (B) global trust, plus (C) their interweaving, to yield scalable trust infrastructure for future computing environments.

Researchers

Jiska Classen

Secure Mobile Networking

Interests:

  • Physical Layer Security.
  • Software Defined Radios.
  • Trust Establishments.
Dr. Jörg Daubert

Telecooperation Group

Interests:

  • Privacy.
  • Anonymous overlay networks.
  • Publish-subscribe.

Mikhail Fomichev

Secure Mobile Networking

Interests:

  • Trust establishment.
  • Authentication for smart devices.
  • Secure communication protocols.

Dr. Sheikh Mahbub Habib

Telecooperation Group

Interests:

  • Computational trust models.
  • Logical reasoning of trust.
  • Trust management mechanisms.
  • Trust-aware security models.
  • Mobile security.

Dr. Emmanouil Vasilomanolakis

Telecooperation Group

Interests:

  • Network Security.
  • Collaborative Intrusion Detection.
  • Honeypots.

 

Daniel Steinmetzer

Secure Mobile Networking

Interests:

  • Wireless communication.
  • Physical Layer Security.
  • Millimeter waves.
  • Software Defined Radios.
  • Security-by-design.

Dr. Florian Volk 

Telecooperation Group

Interests:

  • Computational trust for composite services.
  • Trust decomposition for composite services.
  • Emergent services (in terms of dynamic recomposition).

Nikolaos Alexopoulos

Telecooperation Group

Interests:

  • Computational trust and reputation systems.
  • Privacy.
  • Anonymous communication systems.

CROSSING Publications S1

Additional Attributes

Type

Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices

Daniel Steinmetzer, Daniel Wegemer, Matthias Schulz, Jörg Widmer, Matthias Hollick
In: CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, December 2017
ACM
[Inproceedings]

Implementation of a physical layer for visible light communication using the OpenVLC platform

Tim Kornhuber
October 2017
[Thesis (Master, Bachelor, Diploma)]

Implementierung des unteren MAC-Layers für die OpenVLC-Hardware

Michael Kümpel
October 2017
[Thesis (Master, Bachelor, Diploma)]

Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi

Richard Meister
October 2017
[Thesis (Master, Bachelor, Diploma)]

Automating Trustworthiness Assessment of Mobile Applications

Md. Monirul Islam
October 2017
[Thesis (Master, Bachelor, Diploma)]

Towards Blockchain-Based Collaborative Intrusion Detection Systems

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Max Mühlhäuser
In: International Conference on Critical Information Infrastructures Security, October 2017
Springer-Verlag
[Online-Edition: http://www.critis2017.org]
[Inproceedings]

Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks

Daniel Steinmetzer, Adrian Loch, Amanda García-García, Jörg Widmer, Matthias Hollick
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), p. 6, October 2017
ACM
[Inproceedings]

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2017
[Online-Edition: https://arxiv.org/pdf/1706.09165.pdf]
[Inproceedings]

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev, Flor Álvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick
In: IEEE Communications Surveys & Tutorials, Vol. PP, p. 1-1, September 2017
[Online-Edition: http://ieeexplore.ieee.org/document/8023969/]
[Article]

TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Tamara Frieß, Max Mühlhäuser
In: USENIX Security Symposium Poster Session, August 2017
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
[Misc]

SFB 1119 - Contact


Contact S1

Matthias Hollick
Secure Mobile Networking Lab
Mornewegstr. 32
64293 Darmstadt

Max Mühlhäuser
Telecooperation Group
Technische Universität Darmstadt
Hochschulstr. 10
64289 Darmstadt

 

Funded by

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang