Informationstechnologie
Permanent URI for this collection
Browse
Browsing Informationstechnologie by Department "#PLACEHOLDER_PARENT_METADATA_VALUE#"
Now showing 1 - 20 of 91
Results Per Page
Sort Options
- PublicationA Framework for Measuring the Costs of Security at Runtime(SCITEPRESS, 2019)
; ; ; ;Mauthe, AndreasIn Industry 4.0, Cyber-Physical Systems (CPS) are formed by components, which are interconnected with each other over the Internet of Things (IoT). The resulting capabilities of sensing and affecting the physical world offer a vast range of opportunities, yet, at the same time pose new security challenges. To address these challenges there are various IoT Frameworks, which offer solutions for managing and controlling IoT-components and their interactions. In this regard, providing security for an interaction usually requires performing additional security-related tasks (e.g. authorisation, encryption, etc.) to prevent possible security risks. Research currently focuses more on designing and developing these frameworks and does not satisfactorily provide methodologies for evaluating the resulting costs of providing security. In this paper we propose an initial approach for measuring the resulting costs of providing security for interacting IoT-components by using a Security Cost Modell ing Framework. Furthermore, we describe the necessary building blocks of the framework and provide an experimental design showing how it could be used to measure security costs at runtime.537 1Scopus© Citations 2 - PublicationA Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment(2019)
;Esfahani, A. ;Mantas, G. ;Matischek, R. ;Saghezchi, F.; ; ; ;Schmittner, Ch.Bastos, J.In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the IIoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the IIoT environment. Therefore, lightweight security mechanisms are required for M2M communications in IIoT in order to reach its full potential. As a step toward this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment. The proposed mechanism is characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device's identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.562 1146Scopus© Citations 233 - PublicationA recommendation for suitable technologies for an indoor farming framework(Springer, 2020)
; ; ;Schmittner, Christoph; ;Christl, Korbinian ;Knapitsch, JohannesParapatits, MartinFacing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.604 42254Scopus© Citations 8 - PublicationA Security Cost Modelling Framework for Cyber-Physical Systems(ACM, 2022-05)
; ; ;Gouglidis, Antonios ;Mauthe, AndreasCyber-Physical Systems (CPS) are formed through interconnected components capable of computation, communication, sensing and changing the physical world. The development of these systems poses a significant challenge since they have to be designed in a way to ensure cyber-security without impacting their performance. This article presents the Security Cost Modelling Framework (SCMF) and shows supported by an experimental study how it can be used to measure, normalise and aggregate the overall performance of a CPS. Unlike previous studies, our approach uses different metrics to measure the overall performance of a CPS and provides a methodology for normalising the measurement results of different units to a common Cost Unit. Moreover, we show how the Security Costs can be extracted from the overall performance measurements which allows to quantify the overhead imposed by performing security-related tasks. Furthermore, we describe the architecture of our experimental testbed and demonstrate the applicability of SCMF in an experimental study. Our results show that measuring the overall performance and extracting the security costs using SCMF can serve as basis to redesign interactions to achieve the same overall goal at less costs.167 2Scopus© Citations 2 - PublicationA Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments(2023)
; ;Thiede, Dominik ;Race, Nicholas ;Broadbent, MatthewGouglidis, AntoniosData Center (DC) network requirements. Virtualisation is one of the key drivers of that transformation and enables a massive deployment of computing resources, which exhausts server capacity limits. Furthermore, the increased network endpoints need to be handled dynamically and centrally to facilitate cloud computing functionalities. Traditional DCs barely satisfy those demands because of their inherent limitations based on the network topology. Software-Defined Networks (SDN) promise to meet the increasing network requirements for cloud applications by decoupling control functionalities from data forwarding. Although SDN solutions add more flexibility to DC networks, they also pose new vulnerabilities with a high impact due to the centralised architecture. In this paper we propose an evaluation framework for assessing the security level of SDN architectures in four different stages. Furthermore, we show in an experimental study, how the framework can be used for mapping SDN threats with associated vulnerabilities and necessary mitigations in conjunction with risk and impact classification. The proposed framework helps administrators to evaluate the network security level, to apply countermeasures for identified SDN threats, and to meet the networks security requirements.21 2Scopus© Citations 1 - PublicationAcceptance and Usability of Interactive Infographics in Online Newspapers(Information Visualisation Society Conference, 2017-07-13)
;Zwinger, Sandra ;Langer, JuliaInteractive infographics are a powerful tool to represent and communicate complex information. In data-driven journalism journalists use interactive infographics to explain new insights and facts while telling complex stories on the basis of retrieved data. However, readers of online news are still unexperienced while using interactive infographics. The results of a user survey among readers of online newspapers show how readers use and interact with interactive infographics in online newspapers. To improve the acceptance among users and to identify success factors of their utilization the results of a usability study of interactive infographics are presented.Scopus© Citations 4 186 687 - PublicationAkzeptanz von digitalen Informations-Tools bei Digital Non-Natives(2023-10-13)
;Franc, Elisabeth; Futscher, FabianDigitale Informations-Tools werden in allen Bereichen der Wissensübertragung und Informationsbeschaffung eingesetzt. Beginnend bei Ausbildungsinstituten bis hin zu privaten Unternehmen sind Mitarbeitende dieser Organisationen damit konfrontiert, derartige Tools für die jeweiligen Zielgruppen attraktiv zu gestalten. Bei dieser Gestaltung gilt es, zwischen der Zielgruppe der Digital-Natives und der Digital Non-Natives zu unterscheiden. Die Akzeptanz digitaler Tools ist seitens der Digital Non-Natives oft geringer als die der Digital Natives. Im Rahmen dieser Studie wurde aus diesem Grund der Frage nachgegangen, welche Faktoren die Akzeptanz digitaler Informations-Tools durch Digital Non-Natives beeinflussen. Verschiedene Technologieakzeptanz-Modelle, welche derartige Faktoren beinhalten, werden in dieser Studie diskutiert und in einem konkreten Fallbeispiel bei der Schaffung einer Informationsplattform in Form eines Online Help Centers angewendet. Diese Studie hat gezeigt, dass es wichtig ist, Akzeptanzfaktoren bei der Entwicklung von digitalen Informationsangeboten zu berücksichtigen und dass dadurch eine gesteigerte Akzeptanz des Angebots bei der Zielgruppe der Digital Non-Natives zu erwarten ist.14 511 - PublicationAre South African grape growers aware of their climatic comparative advantages for growing certain grape varieties? A hedonic approach applying machine learningWe assume that each region has its own competitive advantage in growing certain grape varieties, as all varieties have different capabilities to cope with specific weather or climate conditions. In this paper we first analyze the effects of annual weather changes on yields in order to find, which weather is advantageous for which grape variety. This analysis should lead to some kind of ideal weather scenario for each grape variety (like dry and sunny with small rain etc.). In as second step the changing weather conditions in each region are reconciled with these scenarios in order to give recommendations where different grape varieties should be grown. In the third step we compare our recommendations with the distribution of grape varieties in South African wine regions and the uprooting and planting behavior of grape growers.
567 983 - PublicationAutomated and Secure Onboarding for System of Systems(IEEE, 2021-08-03)
; ; ; ; ;Péceli, Bálint ;Singler, Gábor ;Kovács, Kristóf; Delsing, JerkerThe Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services. Device manufacturers are entering the market with internet connected devices, ranging from small sensors to production devices, which are subject of security threats specific to IoT. The onboarding procedure is required to introduce a new device in a System of Systems (SoS) without compromising the already onboarded devices and the underlying infrastructure. Onboarding is the process of providing access to the network and registering the components for the first time in an IoT/SoS framework, thus creating a chain of trust from the hardware device to its hosted software systems and their provided services. The large number and diversity of device hardware, software systems and running services raises the challenge to establish a generic onboarding procedure. In this paper, we present an automated and secure onboarding procedure for SoS. We have implemented the onboarding procedure in the Eclipse Arrowhead framework. However, it can be easily adapted for other IoT/SoS frameworks that are based on Service-oriented Architecture (SoA) principles. The automated onboarding procedure ensures a secure and trusted communication between the new IoT devices and the Eclipse Arrowhead framework. We show its application in a smart charging use case and perform a security assessment.154 1Scopus© Citations 10 - Publication
13 408 - PublicationCo-Creation für ein digitales klimaneutrales Energiesystem - Partizipative Forschung im Projekt(2024-04-18)
;Hatzl, Stefanie ;Moitzi, Katharina; ; ; ; ; Forschungsforum22 308 - Publication
- Publication
Scopus© Citations 14 6 - PublicationConnected cars — Threats, vulnerabilities and their impact(IEEE, 2018-05)
; ; ;Schmittner, Christoph; ; Delsing, JerkerThe growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats.216 1Scopus© Citations 15 - PublicationConsumer preferences for certified wines in France: A comparison of sustainable labels(Firenze University Press, 2021)
;Alonso Ugaglia, Adeline ;Niklas, Britta; ;Moscovici, Dan ;Gow, Jeff ;Valenzuela, LionelMihailescu, Radu89 1Scopus© Citations 11 - PublicationContent CurationDer Beitrag erläutert in kompakter Weise, was Content Curation ist und welche Potentiale mit dem Einsatz von Content Curation im E-Learning für Lernende und Organisationen verbunden sind. Auch werden Modelle für die Umsetzung von Content Curation erläutert und eine Schritt-für-Schritt-Anleitung für die Auswahl eines passenden Content-Curation-Tools gegeben.
121 1 - PublicationDesign Criteria for Instructional VideosThe use of videos in teaching is becoming more and more widespread. For this purpose, not only existing videos are used, but also exclusive videos are created. There are different types of instructional videos used and created for teaching. It is useful to know which design principles these videos should follow in order to evaluate the quality of existing learning videos and to know the criteria one should consider when creating exclusive instructional videos. Therefore, questions arise as to how these videos should be designed to equally support theory and practice and what educational requirements they should meet for the use in teaching. These questions are answered with the framework of the study in hand that applied the method design-based research, incorporating qualitative and quantitative research methods. Survey instruments were guided interviews with experts, questionnaires for school students and a focus group. Participants in the study were teachers and students from the Vienna University of Teacher Education. The field of application was nutrition and consumer education for teaching students of the middle school. The results are presented in the form of design principles
578 617 - PublicationDo corporately organized wine producers cope better with unfavorable weather conditions than private wine estates? Hedonic pricing models for South African winesIn our research we want to estimate the effect of changing weather conditions on south African wine prices for both, small wine estates and corporately organized producers and to compare these results. We assume that the latter cope better with unfavourable weather conditions than private wine estates, whereas beneficial weather will be favourable for both of them. We focus on the South African domestic wine market, as prices on export markets are additionally influenced by other factors, such as marketing strategies, certifications, mark ups of wholesalers or retailers etc.
429 801