Solutions

The goal of this project area is to provide cryptography-based security solutions that match all the necessary functional requirements to establish trust in new and next generation computing environments. Such solutions have been and will be indispensable to establish trust in the identities and properties of actors, in the soundness of their devices, and in the proper functioning and privacy-friendliness of services.

S1 - Scalable Trust Infrastructures

The goal of S1 is to advance computational trust for the benefit of cryptography. Probabilistic trust values will be computed and continuously managed in concert with cryptographic solutions, reflecting the trustworthiness of cryptographic objects, and linked to various entities. The differentiation of trust contexts shall be supported. The project builds on two fundamental concepts of human trust: (A) personal encounters, and (B) the propagation of trust from acquaintances to communities. The project thus develop concepts coined as (A) situated trust and (B) global trust, plus (C) their interweaving, to yield scalable trust infrastructure for future computing environments.

Researchers

Jiska Classen

Secure Mobile Networking

Interests:

  • Physical Layer Security.
  • Software Defined Radios.
  • Trust Establishments.
Dr. Jörg Daubert

Telecooperation Group

Interests:

  • Privacy.
  • Anonymous overlay networks.
  • Publish-subscribe.

Mikhail Fomichev

Secure Mobile Networking

Interests:

  • Trust establishment.
  • Authentication for smart devices.
  • Secure communication protocols.

Dr. Sheikh Mahbub Habib

Telecooperation Group

Interests:

  • Computational trust models.
  • Logical reasoning of trust.
  • Trust management mechanisms.
  • Trust-aware security models.
  • Mobile security.

Nikolaos Alexopoulos

Telecooperation Group

Interests:

  • Computational trust and reputation systems.
  • Privacy.
  • Anonymous communication systems.

 

Daniel Steinmetzer

Secure Mobile Networking

Interests:

  • Wireless communication.
  • Physical Layer Security.
  • Millimeter waves.
  • Software Defined Radios.
  • Security-by-design.

Flor Álvarez

Secure Mobile Networking

Interests:

  • Key Establishment in mobile ad hoc networks
  • Emergency communication
  • Delay-tolerant networks
  • Secure routing

Sven Neubauer

Secure Mobile Networking

CROSSING Publications S1

Additional Attributes

Type

Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices

Daniel Steinmetzer, Daniel Wegemer, Matthias Schulz, Jörg Widmer, Matthias Hollick
In: CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, December 2017
ACM
[Inproceedings]

A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices

Daniel Steinmetzer, Daniel Wegemer, Matthias Schulz, Jörg Widmer, Matthias Hollick
In: NSF RCN workshop, December 2017
NSF Millimeter-Wave RCN
[Inproceedings]

I Trust my Zombies: a Trust-enabled Botnet

Emmanouil Vasilomanolakis, Jan Helge Wolf, Leon Böck, Max Mühlhäuser, Shankar Karuppayah
In: Blackhat Europe, December 2017
[Online-Edition: https://www.blackhat.com/eu-17]
[Inproceedings]

ID2T - The Intrusion Detection Dataset Generation Toolkit

Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser
December 2017
[Online-Edition: https://www.blackhat.com/eu-17]
[Misc]

Towards Blockchain-Based Collaborative Intrusion Detection Systems

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Max Mühlhäuser
In: International Conference on Critical Information Infrastructures Security, October 2017
Springer-Verlag
[Online-Edition: http://www.critis2017.org]
[Inproceedings]

Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks

Daniel Steinmetzer, Adrian Loch, Amanda García-García, Jörg Widmer, Matthias Hollick
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), p. 6, October 2017
ACM
[Inproceedings]

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2017
[Online-Edition: https://arxiv.org/pdf/1706.09165.pdf]
[Inproceedings]

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev, Flor Álvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick
In: IEEE Communications Surveys & Tutorials, Vol. PP, p. 1-1, September 2017
[Online-Edition: http://ieeexplore.ieee.org/document/8023969/]
[Article]

TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)

Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natalia Reka Ivanko, Tamara Frieß, Max Mühlhäuser
In: USENIX Security Symposium Poster Session, August 2017
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
[Misc]

Beyond the Hype: On Using Blockchains in Trust Management for Authentication

Nikolaos Alexopoulos, Jörg Daubert, Max Mühlhäuser, Sheikh Mahbub Habib
In: TrustCom, August 2017
IEEE
[Online-Edition: http://stprp-activity.com/TrustCom2017]
[Inproceedings]

SFB 1119 - Contact


Contact S1

Matthias Hollick
Secure Mobile Networking Lab
Mornewegstr. 32
64293 Darmstadt

Max Mühlhäuser
Telecooperation Group
Technische Universität Darmstadt
Hochschulstr. 10
64289 Darmstadt

 

Funded by

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang