WARNING: This information is likely out-of-date and will not be updated!
Last updated on 2015-10-06
|
| |||||||
Contact:
|
I am a Post-Doctoral Researcher at the Chair of Communication and Distributed Systems at RWTH Aachen University (Germany). I began my studies in Computer Science at RWTH Aachen University in 2002 and graduated with Diploma degree (equiv. M.Sc.) in 2009. I then joined the Chair of Communication and Distributed Systems as a Researcher and PhD Student. In July 2015, I completed my PhD.
During my studies, I received a short-term study diploma (with honours) at the University of Kent at Canterbury (England) in 2006. My stay abroad was supported by the Erasmus exchange program. I worked on my diploma thesis at the Helsinki Institute for Information Technology (HIIT) in Finland supported by a scholarship of the Deutscher Akademischer Austausch Dienst (DAAD) in 2008. My Diploma thesis covers the topic of providing efficient identity-based security functions on in-network elements and was awarded with the Ericsson-UMIC-Diploma Thesis Award in 2009. My PhD thesis revolves around the topic of resource-conscious network scenario for the embedded Internet of Things. My research interests comprise mobile and wireless networking, secure end-to-middle communication as well as efficient network security for the IP-based Internet of Things. I am actively involved in the standardization process of security-related topics at the Internet Engineering Task Force (IETF).
2017 | |
29. |
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
2015 | |
28. |
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
27. |
Autorisierungsmanagement für das Internet of Things
D•A•CH Security 2015
September
2015
Accepted
|
26. |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
June
2015
ISBN: 978-3-8440-3755-5
|
25. |
Resource-Conscious Network Security for the IP-Based Internet of Things
RWTH Aachen University,
2015
|
2014 | |
24. |
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
23. |
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
22. |
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September
2014
|
21. |
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014), page 284-292.
Publisher: IEEE,
June
2014
|
2013 | |
20. |
International Journal of Grid and High Performance Computing (IJGHPC),
5(4):97-112
December
2013
ISSN: 1938-0259
|
19. |
21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), Göttingen, Germany, page 1-3.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
18. |
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October
2013
ISBN: 978-1-4577-2014-7
|
17. |
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
16. |
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal,
13(10):3711-3720
October
2013
ISSN: 1530-437X
|
15. |
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May
2013
DOI: 10.1109/SPW.2013.31
ISBN: 978-1-4799-0458-7
|
14. |
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-2003-0
|
13. |
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
2012 | |
12. |
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December
2012
ISBN: 978-1-4673-4511-8
|
11. |
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June
2012
ISBN: 978-1-4673-2172-3
|
10. |
Proceedings of the IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, page 653-658.
Publisher: IEEE,
June
2012
ISBN: 978-1-4577-2051-2
|
9. |
Workshop on Smart Object Security
March
2012
|
2011 | |
8. |
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
ITU
December
2011
ISBN: 978-92-61-13651-2
|
7. |
Springer Wireless Personal Communications Journal,
61(3):527-542
October
2011
ISSN: 0929-6212
|
6. |
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA, page 89-90.
Publisher: ACM, New York, NY, USA
September
2011
ISBN: 978-1-4503-0867-0
|
5. |
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany Volume 15, page 35--36.
Publisher: ACM, New York, NY, USA
June
2011
|
4. |
Interconnecting Smart Objects with the Internet Workshop
March
2011
|
2010 | |
3. |
International Conference on Computer Communication Networks, ICCCN 2010, Zurich Volume 1, page 588-593.
Publisher: IEEE Press, Washington, DC, USA
August
2010
ISBN: 978-1-4244-7114-0
|
2. |
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany. Volume 1, page 588 - 593.
Publisher: IEEE Press, Washington, DC, USA
April
2010
ISBN: 978-1-4244-6605-4
|
2009 | |
1. |
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany Volume 1, page 791-796.
IEEE
Publisher: Piscataway, NJ, USA, Dresden, Germany
2009
ISBN: 978-1-4244-3435-0
|
2017 | |
29. |
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2,
page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November
2017
ISBN: 978-1-119-22604-8
|
2015 | |
28. |
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5
|
27. |
Autorisierungsmanagement für das Internet of Things
D•A•CH Security 2015
September
2015
Accepted
|
26. |
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
June
2015
ISBN: 978-3-8440-3755-5
|
25. |
Resource-Conscious Network Security for the IP-Based Internet of Things
RWTH Aachen University,
2015
|
2014 | |
24. |
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
23. |
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December
2014
ISBN: 978-3-319-12717-0
|
22. |
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September
2014
|
21. |
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014), page 284-292.
Publisher: IEEE,
June
2014
|
2013 | |
20. |
International Journal of Grid and High Performance Computing (IJGHPC),
5(4):97-112
December
2013
ISSN: 1938-0259
|
19. |
21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), Göttingen, Germany, page 1-3.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
18. |
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October
2013
ISBN: 978-1-4577-2014-7
|
17. |
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October
2013
ISBN: 978-1-4799-1270-4
|
16. |
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal,
13(10):3711-3720
October
2013
ISSN: 1530-437X
|
15. |
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May
2013
DOI: 10.1109/SPW.2013.31
ISBN: 978-1-4799-0458-7
|
14. |
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-2003-0
|
13. |
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April
2013
ISBN: 978-1-4503-1998-0
|
2012 | |
12. |
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December
2012
ISBN: 978-1-4673-4511-8
|
11. |
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June
2012
ISBN: 978-1-4673-2172-3
|
10. |
Proceedings of the IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, page 653-658.
Publisher: IEEE,
June
2012
ISBN: 978-1-4577-2051-2
|
9. |
Workshop on Smart Object Security
March
2012
|
2011 | |
8. |
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
ITU
December
2011
ISBN: 978-92-61-13651-2
|
7. |
Springer Wireless Personal Communications Journal,
61(3):527-542
October
2011
ISSN: 0929-6212
|
6. |
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA, page 89-90.
Publisher: ACM, New York, NY, USA
September
2011
ISBN: 978-1-4503-0867-0
|
5. |
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany Volume 15, page 35--36.
Publisher: ACM, New York, NY, USA
June
2011
|
4. |
Interconnecting Smart Objects with the Internet Workshop
March
2011
|
2010 | |
3. |
International Conference on Computer Communication Networks, ICCCN 2010, Zurich Volume 1, page 588-593.
Publisher: IEEE Press, Washington, DC, USA
August
2010
ISBN: 978-1-4244-7114-0
|
2. |
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany. Volume 1, page 588 - 593.
Publisher: IEEE Press, Washington, DC, USA
April
2010
ISBN: 978-1-4244-6605-4
|
2009 | |
1. |
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany Volume 1, page 791-796.
IEEE
Publisher: Piscataway, NJ, USA, Dresden, Germany
2009
ISBN: 978-1-4244-3435-0
|
As part of my work at COMSYS, I was and still am involved in the acquisition, the organization, and the development of several third-party funded research projects. The list below shows the funded research projects that I have actively contributed to during the project phase.
funded by BMWi within the Trusted Cloud framework
The project SensorCloud is a collaboration of the Chairs of Computer Science 3 and 4 at RWTH Aachen University, with three partners from academia and industry. It is a joint effort to securely integrate two recent trends in computer science: the Internet of Things (also known as Cyber-Physical-Systems) and Cloud Computing.
For further information, visit our project website or www.sensorcloud.de.
funded by Ziel2.NRW and the ERDF of the European Union
The project Mobile ACcess is a collaboration of the Chairs of Computer Science 4 and 8 at RWTH Aachen University with seven municipal and industrial partners including the cities of Aachen and Monschau. It is a joint effort to show the feasibility and practicability of a city-wide network consisting of individual access networks united by a novel concept for Wi-Fi sharing communities.
For further information, visit our project website or www.mobile-access.org.
e
In the past, I have been working with a number of passionate, highly motivated, and gifted students. The list below shows all submitted student theses that I have (co-)advised. The supervisor for all these theses was Klaus Wehrle. I would like to thank all of the people listed below for their great work and their valuable contributions to my dissertation and to the specific research project in focus of their thesis.
Francisco Vidal-Meca
6LoWPAN Virtual Networks
Master's Thesis, RWTH Aachen University, September 2014
in collaboration with Philips Research, co-advised with Oscar Garcia-Morchon
Benedikt Wolters
Distributed Authorization Management for Secure Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
co-advised with Martin Henze
Sebastian Bereda
Flexible Configuration and Service Abstraction for Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
co-advised with Martin Henze
Adel Zaalouk
Taking In-Network Security To The Next Level With Software-Defined Networking
Master's Thesis, RWTH Aachen University, January 2014
in collaboration with Fraunhofer SIT, co-advised with Rahamatullah Khondoker and Ronald Marx
Aivar Kripsaar
Access Control for Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, January 2014
co-advised with Martin Henze
Devran Ölcer
Efficient Signature Schemes for Sensor Data in the Cloud
Master's Thesis, RWTH Aachen University, November 2013
co-advised with Martin Henze
Maximilian Bogner
Selective Payload Security in the Internet of Things
Bachelor's Thesis, RWTH Aachen University, August 2013
Hossein Shafagh
Leveraging Public-key-based Authentication for the Internet of Things
Master's Thesis, RWTH Aachen University, July 2013
in collaboration with SICS Swedish ICT, co-advised with Shahid Raza
awarded with the KuVS prize for best Master's thesis in 2013
Kevin Möllering
DARAS - A Distributed Accountable Resource Allocation System for Peer-to-Peer Networks
Master's Thesis, RWTH Aachen University, July 2013
co-advised with Martin Henze
Enrique Diego Biurrun Sotelo
Automatic Generation of Inputs for High-Coverage Testing of Network Protocol Implementations
Diploma Thesis, RWTH Aachen University, July 2013
co-advised with Raimondas Sasnauskas
Marc Seebold
Privacy-aware Operations on Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2013
co-advised with Martin Henze
Roman Matzutt
User-controlled Utilization of Sensor Data for Cloud Computing
Bachelor's Thesis, RWTH Aachen University, March 2013
co-advised with Martin Henze
awarded with the third place of audimax-MINT-Award 2013
Christian Röller
User-Defined Trust Overlay Networks for Smart Objects
Diploma Thesis, RWTH Aachen University, October 2012
Jens Hiller
Implementation of the HIP Diet EXchange and Optimizations for Smart Object Networks
Bachelor's Thesis, RWTH Aachen University, September 2012
awarded with the KuVS prize for best Bachelor's thesis in 2012
Anupam Ashish
Service Negotiation and Selective Disclosure of Endpoint Information for on-path Middleboxes
Master's Thesis, RWTH Aachen University, July 2012
Andreas Kirmse
Analyzing the Privacy Leakage of Web Usage
Bachelor's Thesis, RWTH Aachen University, March 2012
co-advised with Hendrik vom Lehn and Martin Henze
Timo Boettcher
Analysis and mitigation of fragmentation attacks against the 6LoWPAN adaptation layer
Diploma Thesis, RWTH Aachen University, November 2011
Felix Matenaar
Evaluation von Heuristiken zur Erkennung von Kryptographie in Software
Bachelor's Thesis, RWTH Aachen University, October 2011
in collaboration with University of Bonn, co-advised with Andre Wichmann and Felix Leder
Jan Henrik Ziegeldorf
Enabling and Capitalizing Origin and Flow Information on the Communication Path using Identity-based Signaling
Diploma Thesis, RWTH Aachen University, April 2011
Tim Just
Adaptable and Flexible Protocols and Protocol Implementations
Diploma Thesis, RWTH Aachen University, May 2010
Moritz Venn
libFTL:a packet Filtering and Tunneling abstraction Layer for Linux and Windows
Bachelor's Thesis, RWTH Aachen University, April 2010
e