WARNING: This information is likely out-of-date and will not be updated!
Last updated on 2015-10-06

Dr. rer. nat. René Hummen


Postal Address:
Communication and Distributed Systems
Chair of Computer Science IV
RWTH Aachen University
Ahornstr. 55
52074 Aachen


Visiting Address:
Building E3
Ahornstr. 55
Room 9017

Contact:

Phone: +49 241 80 21426
Fax: +49 241 80 22220
E-mail: rene.hummen(at)cs.rwth-aachen.de

Short Biography

I am a Post-Doctoral Researcher at the Chair of Communication and Distributed Systems at RWTH Aachen University (Germany). I began my studies in Computer Science at RWTH Aachen University in 2002 and graduated with Diploma degree (equiv. M.Sc.) in 2009. I then joined the Chair of Communication and Distributed Systems as a Researcher and PhD Student. In July 2015, I completed my PhD.

During my studies, I received a short-term study diploma (with honours) at the University of Kent at Canterbury (England) in 2006. My stay abroad was supported by the Erasmus exchange program. I worked on my diploma thesis at the Helsinki Institute for Information Technology (HIIT) in Finland supported by a scholarship of the Deutscher Akademischer Austausch Dienst (DAAD) in 2008. My Diploma thesis covers the topic of providing efficient identity-based security functions on in-network elements and was awarded with the Ericsson-UMIC-Diploma Thesis Award in 2009. My PhD thesis revolves around the topic of resource-conscious network scenario for the embedded Internet of Things. My research interests comprise mobile and wireless networking, secure end-to-middle communication as well as efficient network security for the IP-based Internet of Things. I am actively involved in the standardization process of security-related topics at the Internet Engineering Task Force (IETF).

Publications

2017

29.
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2, page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November 2017
ISBN: 978-1-119-22604-8

2015

28.
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September 2015
ISBN: 978-3-319-29882-5
27.
Stefanie Gerdes, René Hummen, and Olaf Bergmann
Autorisierungsmanagement für das Internet of Things
D•A•CH Security 2015
September 2015
Accepted
26.
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
June 2015
ISBN: 978-3-8440-3755-5
25.
Resource-Conscious Network Security for the IP-Based Internet of Things
RWTH Aachen University,
2015

2014

24.
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December 2014
ISBN: 978-3-319-12717-0
23.
Michael Eggert, Roger Häußling, Martin Henze, Lars Hermerschmidt, René Hummen, Daniel Kerpen, Antonio Navarro Pérez, Bernhard Rumpe, Dirk Thißen, and Klaus Wehrle
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December 2014
ISBN: 978-3-319-12717-0
22.
Martin Henze, Sebastian Bereda, René Hummen, and Klaus Wehrle
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September 2014
21.
René Hummen, Hossein Shafagh, Shahid Raza, Thiemo Voigt, and Klaus Wehrle
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014), page 284-292.
Publisher: IEEE,
June 2014

2013

20. International Journal of Grid and High Performance Computing (IJGHPC), 5(4):97-112
December 2013
ISSN: 1938-0259
19.
21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), Göttingen, Germany, page 1-3.
Publisher: IEEE,
October 2013
ISBN: 978-1-4799-1270-4
18.
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October 2013
ISBN: 978-1-4577-2014-7
17.
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October 2013
ISBN: 978-1-4799-1270-4
16.
Shahid Raza, Hossein Shafagh, Kasun Hewage, René Hummen, and Thiemo Voigt
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal, 13(10):3711-3720
October 2013
ISSN: 1530-437X
15.
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May 2013
ISBN: 978-1-4799-0458-7
14.
René Hummen, Jan Henrik Ziegeldorf, Hossein Shafagh, Shahid Raza, and Klaus Wehrle
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April 2013
ISBN: 978-1-4503-2003-0
13.
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April 2013
ISBN: 978-1-4503-1998-0

2012

12.
René Hummen, Martin Henze, Daniel Catrein, and Klaus Wehrle
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December 2012
ISBN: 978-1-4673-4511-8
11.
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June 2012
ISBN: 978-1-4673-2172-3
10.
Proceedings of the IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, page 653-658.
Publisher: IEEE,
June 2012
ISBN: 978-1-4577-2051-2
9.
René Hummen, Christian Röller, and Klaus Wehrle
Workshop on Smart Object Security
March 2012

2011

8.
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
ITU
December 2011
ISBN: 978-92-61-13651-2
7.
Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, and Klaus Wehrle
Springer Wireless Personal Communications Journal, 61(3):527-542
October 2011
ISSN: 0929-6212
6.
Hanno Wirtz, Robert Backhaus, René Hummen, and Klaus Wehrle
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA, page 89-90.
Publisher: ACM, New York, NY, USA
September 2011
ISBN: 978-1-4503-0867-0
5.
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany Volume 15, page 35--36.
Publisher: ACM, New York, NY, USA
June 2011
4.
Interconnecting Smart Objects with the Internet Workshop
March 2011

2010

3.
International Conference on Computer Communication Networks, ICCCN 2010, Zurich Volume 1, page 588-593.
Publisher: IEEE Press, Washington, DC, USA
August 2010
ISBN: 978-1-4244-7114-0
2.
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany. Volume 1, page 588 - 593.
Publisher: IEEE Press, Washington, DC, USA
April 2010
ISBN: 978-1-4244-6605-4

2009

1.
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany Volume 1, page 791-796.
IEEE
Publisher: Piscataway, NJ, USA, Dresden, Germany
2009
ISBN: 978-1-4244-3435-0
Export as:
BibTeX, XML

Standardization Documents and Technical Reports

2017

29.
Network Security and Privacy for Cyber-Physical Systems
Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications
Chapter 2, page 25-56.
Publisher: Wiley-IEEE Press,
First edition
November 2017
ISBN: 978-1-119-22604-8

2015

28.
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September 2015
ISBN: 978-3-319-29882-5
27.
Stefanie Gerdes, René Hummen, and Olaf Bergmann
Autorisierungsmanagement für das Internet of Things
D•A•CH Security 2015
September 2015
Accepted
26.
Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
June 2015
ISBN: 978-3-8440-3755-5
25.
Resource-Conscious Network Security for the IP-Based Internet of Things
RWTH Aachen University,
2015

2014

24.
A Trust Point-based Security Architecture for Sensor Data in the Cloud
Trusted Cloud Computing
page 77-106.
Publisher: Springer,
December 2014
ISBN: 978-3-319-12717-0
23.
Michael Eggert, Roger Häußling, Martin Henze, Lars Hermerschmidt, René Hummen, Daniel Kerpen, Antonio Navarro Pérez, Bernhard Rumpe, Dirk Thißen, and Klaus Wehrle
Trusted Cloud Computing
page 203-218.
Publisher: Springer,
December 2014
ISBN: 978-3-319-12717-0
22.
Martin Henze, Sebastian Bereda, René Hummen, and Klaus Wehrle
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada Volume 37of Procedia Computer Science, page 370-375.
Publisher: Elsevier,
September 2014
21.
René Hummen, Hossein Shafagh, Shahid Raza, Thiemo Voigt, and Klaus Wehrle
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014), page 284-292.
Publisher: IEEE,
June 2014

2013

20. International Journal of Grid and High Performance Computing (IJGHPC), 5(4):97-112
December 2013
ISSN: 1938-0259
19.
21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), Göttingen, Germany, page 1-3.
Publisher: IEEE,
October 2013
ISBN: 978-1-4799-1270-4
18.
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on, page 259-266.
Publisher: IEEE,
October 2013
ISBN: 978-1-4577-2014-7
17.
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, page 1-10.
Publisher: IEEE,
October 2013
ISBN: 978-1-4799-1270-4
16.
Shahid Raza, Hossein Shafagh, Kasun Hewage, René Hummen, and Thiemo Voigt
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal, 13(10):3711-3720
October 2013
ISSN: 1530-437X
15.
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, page 18-22.
Publisher: IEEE,
May 2013
ISBN: 978-1-4799-0458-7
14.
René Hummen, Jan Henrik Ziegeldorf, Hossein Shafagh, Shahid Raza, and Klaus Wehrle
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Publisher: ACM,
April 2013
ISBN: 978-1-4503-2003-0
13.
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Publisher: ACM,
April 2013
ISBN: 978-1-4503-1998-0

2012

12.
René Hummen, Martin Henze, Daniel Catrein, and Klaus Wehrle
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, page 232-240.
Publisher: IEEE,
December 2012
ISBN: 978-1-4673-4511-8
11.
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), page 525--532.
IEEE
June 2012
ISBN: 978-1-4673-2172-3
10.
Proceedings of the IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, page 653-658.
Publisher: IEEE,
June 2012
ISBN: 978-1-4577-2051-2
9.
René Hummen, Christian Röller, and Klaus Wehrle
Workshop on Smart Object Security
March 2012

2011

8.
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
ITU
December 2011
ISBN: 978-92-61-13651-2
7.
Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, and Klaus Wehrle
Springer Wireless Personal Communications Journal, 61(3):527-542
October 2011
ISSN: 0929-6212
6.
Hanno Wirtz, Robert Backhaus, René Hummen, and Klaus Wehrle
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA, page 89-90.
Publisher: ACM, New York, NY, USA
September 2011
ISBN: 978-1-4503-0867-0
5.
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany Volume 15, page 35--36.
Publisher: ACM, New York, NY, USA
June 2011
4.
Interconnecting Smart Objects with the Internet Workshop
March 2011

2010

3.
International Conference on Computer Communication Networks, ICCCN 2010, Zurich Volume 1, page 588-593.
Publisher: IEEE Press, Washington, DC, USA
August 2010
ISBN: 978-1-4244-7114-0
2.
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany. Volume 1, page 588 - 593.
Publisher: IEEE Press, Washington, DC, USA
April 2010
ISBN: 978-1-4244-6605-4

2009

1.
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany Volume 1, page 791-796.
IEEE
Publisher: Piscataway, NJ, USA, Dresden, Germany
2009
ISBN: 978-1-4244-3435-0
Export as:
BibTeX, XML

Third-Party Funded Research Projects

As part of my work at COMSYS, I was and still am involved in the acquisition, the organization, and the development of several third-party funded research projects. The list below shows the funded research projects that I have actively contributed to during the project phase.

SensorCloud (2012 - 2014)

funded by BMWi within the Trusted Cloud framework
The project SensorCloud is a collaboration of the Chairs of Computer Science 3 and 4 at RWTH Aachen University, with three partners from academia and industry. It is a joint effort to securely integrate two recent trends in computer science: the Internet of Things (also known as Cyber-Physical-Systems) and Cloud Computing.

For further information, visit our project website or www.sensorcloud.de.

Mobile ACcess (2009 - 2012)

funded by Ziel2.NRW and the ERDF of the European Union
The project Mobile ACcess is a collaboration of the Chairs of Computer Science 4 and 8 at RWTH Aachen University with seven municipal and industrial partners including the cities of Aachen and Monschau. It is a joint effort to show the feasibility and practicability of a city-wide network consisting of individual access networks united by a novel concept for Wi-Fi sharing communities.

For further information, visit our project website or www.mobile-access.org.

e

Advised Student Theses

In the past, I have been working with a number of passionate, highly motivated, and gifted students. The list below shows all submitted student theses that I have (co-)advised. The supervisor for all these theses was Klaus Wehrle. I would like to thank all of the people listed below for their great work and their valuable contributions to my dissertation and to the specific research project in focus of their thesis.

2014

Francisco Vidal-Meca
6LoWPAN Virtual Networks
Master's Thesis, RWTH Aachen University, September 2014
in collaboration with Philips Research, co-advised with Oscar Garcia-Morchon

Benedikt Wolters
Distributed Authorization Management for Secure Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
co-advised with Martin Henze

Sebastian Bereda
Flexible Configuration and Service Abstraction for Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2014
co-advised with Martin Henze

Adel Zaalouk
Taking In-Network Security To The Next Level With Software-Defined Networking
Master's Thesis, RWTH Aachen University, January 2014
in collaboration with Fraunhofer SIT, co-advised with Rahamatullah Khondoker and Ronald Marx

Aivar Kripsaar
Access Control for Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, January 2014
co-advised with Martin Henze

2013

Devran Ölcer
Efficient Signature Schemes for Sensor Data in the Cloud
Master's Thesis, RWTH Aachen University, November 2013
co-advised with Martin Henze

Maximilian Bogner
Selective Payload Security in the Internet of Things
Bachelor's Thesis, RWTH Aachen University, August 2013

Hossein Shafagh
Leveraging Public-key-based Authentication for the Internet of Things
Master's Thesis, RWTH Aachen University, July 2013
in collaboration with SICS Swedish ICT, co-advised with Shahid Raza
awarded with the KuVS prize for best Master's thesis in 2013

Kevin Möllering
DARAS - A Distributed Accountable Resource Allocation System for Peer-to-Peer Networks
Master's Thesis, RWTH Aachen University, July 2013
co-advised with Martin Henze

Enrique Diego Biurrun Sotelo
Automatic Generation of Inputs for High-Coverage Testing of Network Protocol Implementations
Diploma Thesis, RWTH Aachen University, July 2013
co-advised with Raimondas Sasnauskas

Marc Seebold
Privacy-aware Operations on Encrypted Sensor Data in the Cloud
Bachelor's Thesis, RWTH Aachen University, March 2013
co-advised with Martin Henze

Roman Matzutt
User-controlled Utilization of Sensor Data for Cloud Computing
Bachelor's Thesis, RWTH Aachen University, March 2013
co-advised with Martin Henze
awarded with the third place of audimax-MINT-Award 2013

2012

Christian Röller
User-Defined Trust Overlay Networks for Smart Objects
Diploma Thesis, RWTH Aachen University, October 2012

Jens Hiller
Implementation of the HIP Diet EXchange and Optimizations for Smart Object Networks
Bachelor's Thesis, RWTH Aachen University, September 2012
awarded with the KuVS prize for best Bachelor's thesis in 2012

Anupam Ashish
Service Negotiation and Selective Disclosure of Endpoint Information for on-path Middleboxes
Master's Thesis, RWTH Aachen University, July 2012

Andreas Kirmse
Analyzing the Privacy Leakage of Web Usage
Bachelor's Thesis, RWTH Aachen University, March 2012
co-advised with Hendrik vom Lehn and Martin Henze

2011

Timo Boettcher
Analysis and mitigation of fragmentation attacks against the 6LoWPAN adaptation layer
Diploma Thesis, RWTH Aachen University, November 2011

Felix Matenaar
Evaluation von Heuristiken zur Erkennung von Kryptographie in Software
Bachelor's Thesis, RWTH Aachen University, October 2011
in collaboration with University of Bonn, co-advised with Andre Wichmann and Felix Leder

Jan Henrik Ziegeldorf
Enabling and Capitalizing Origin and Flow Information on the Communication Path using Identity-based Signaling
Diploma Thesis, RWTH Aachen University, April 2011

2010

Tim Just
Adaptable and Flexible Protocols and Protocol Implementations
Diploma Thesis, RWTH Aachen University, May 2010

Moritz Venn
libFTL:a packet Filtering and Tunneling abstraction Layer for Linux and Windows
Bachelor's Thesis, RWTH Aachen University, April 2010

e

- Impressum | Datenschutz -