99 research outputs found
Virtual WLAN: Going beyond Virtual Access Points
Wireless nodes equipped with multiple radio interfaces open up new fields of application. Ranging from multi-channel usage in a cell in order to increase the bandwidth to the creation of meshed multi-hop topologies. Using multiple wireless cards demands a large physical space, more energy consumption and as a consequence decreasing in the battery lifetime. Virtualization of the wireless network interface, which means to use a single wireless network interface to connect to more than one network simultaneously, seems to be a promising approach, since it allows us to realize the mentioned scenarios only with one radio interface. In this paper, we want to shed light on the state of the art and want to introduce new approaches to push this field beyond the current status
Data Governance and Sovereignty in Urban Data Spaces Based on Standardized ICT Reference Architectures
European cities and communities (and beyond) require a structured overview and a set of tools as to achieve a sustainable transformation towards smarter cities/municipalities, thereby leveraging on the enormous potential of the emerging data driven economy. This paper presents the results of a recent study that was conducted with a number of German municipalities/cities. Based on the obtained and briefly presented recommendations emerging from the study, the authors propose the concept of an Urban Data Space (UDS), which facilitates an eco-system for data exchange and added value creation thereby utilizing the various types of data within a smart city/municipality. Looking at an Urban Data Space from within a German context and considering the current situation and developments in German municipalities, this paper proposes a reasonable classification of urban data that allows the relation of various data types to legal aspects, and to conduct solid considerations regarding technical implementation designs and decisions. Furthermore, the Urban Data Space is described/analyzed in detail, and relevant stakeholders are identified, as well as corresponding technical artifacts are introduced. The authors propose to setup Urban Data Spaces based on emerging standards from the area of ICT reference architectures for Smart Cities, such as DIN SPEC 91357 “Open Urban Platform” and EIP SCC. In the course of this, the paper walks the reader through the construction of a UDS based on the above-mentioned architectures and outlines all the goals, recommendations and potentials, which an Urban Data Space can reveal to a municipality/city. Finally, we aim at deriving the proposed concepts in a way that they have the potential to be part of the required set of tools towards the sustainable transformation of German and European cities in the direction of smarter urban environments, based on utilizing the hidden potential of digitalization and efficient interoperable data exchange.EC/H2020/646578/EU/Triangulum: The Three Point Project / Demonstrate. Disseminate. Replicate./TriangulumBMBF, 13NKE012, Datenaustausch und Zusammenarbeit im urbanen Raum - Bestandsanalyse (Urban Data Space
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
The factories of the future require efficient interconnection of their
physical machines into the cyber space to cope with the emerging need of an
increased uptime of machines, higher performance rates, an improved level of
productivity and a collective collaboration along the supply chain. With the
rapid growth of the Internet of Things (IoT), and its application in industrial
areas, the so called Industrial Internet of Things (IIoT)/Industry 4.0 emerged.
However, further to the rapid growth of IoT/IIoT systems, cyber attacks are an
emerging threat and simple manual security testing can often not cope with the
scale of large IoT/IIoT networks. In this paper, we suggest to extract metadata
from commonly used diagrams and models in a typical software development
process, to automate the process of threat modelling, security analysis and
penetration testing, without detailed prior security knowledge. In that
context, we present requirements and recommendations for metadata in IoT/IIoT
models that are needed as necessary input parameters of security assurance
tools.Comment: 8 pages, Proceedings of the 14th International Conference on
Availability, Reliability and Security (ARES 2019) (ARES '19), August 26-29,
2019, Canterbury, United Kingdo
Model-Based Security Testing
Security testing aims at validating software system requirements related to
security properties like confidentiality, integrity, authentication,
authorization, availability, and non-repudiation. Although security testing
techniques are available for many years, there has been little approaches that
allow for specification of test cases at a higher level of abstraction, for
enabling guidance on test identification and specification as well as for
automated test generation.
Model-based security testing (MBST) is a relatively new field and especially
dedicated to the systematic and efficient specification and documentation of
security test objectives, security test cases and test suites, as well as to
their automated or semi-automated generation. In particular, the combination of
security modelling and test generation approaches is still a challenge in
research and of high interest for industrial applications. MBST includes e.g.
security functional testing, model-based fuzzing, risk- and threat-oriented
testing, and the usage of security test patterns. This paper provides a survey
on MBST techniques and the related models as well as samples of new methods and
tools that are under development in the European ITEA2-project DIAMONDS.Comment: In Proceedings MBT 2012, arXiv:1202.582
Robust architecture for distributed intelligence in an IP-based mobile wide-area surveillance system
- …