Research Outputs

2021 2021 2020 2020 2019 2019 2018 2018 0.0 0.0 0.2 0.2 0.4 0.4 0.6 0.6 0.8 0.8 1.0 1.0 1.2 1.2 1.4 1.4 1.6 1.6 1.8 1.8 2.0 2.0
Now showing 1 - 5 of 5
  • Publication
    Towards a secure and self-adapting smart indoor farming framework
    (Springer, 2019-10-21) ; ; ;
    Schmittner, Christoph 
    ;
    Christl, Korbinian 
    ;
    Knapitsch, Johannes 
    ;
    Parapatits, Martin 
    Facing the increase in world population and the stagnation in available arable land there is a high demand for optimizing the food production. Considering the world-wide and ongoing reduction of the agricultural labor force novel approaches for food production are required. Vertical farming may be such a solution where plants are being produced indoors in racks, cared by robotic appliances which will be operated by specialized software. Given the multitude of parameters which determine the ideal condition, a lot of data needs to be acquired. As this data is used to adapt the entire Cyber-Physical System to a changing environment the data has to be secure and adaptations have to consider safety aspects as well. Such systems must hence be secure, safe, scalable and self-adaptable to a high degree. We present an important element for such solutions, a cloud, IoT and robotic based smart farming framework.
      611  34981Scopus© Citations 16
  • Publication
      271  610
  • Publication
    Risk Management and Standard Compliance for Cyber-Physical Systems of Systems
    (Scientific Association for Infocommunications (HTE), 2021) ;
    Chlup, Sebastian 
    ;
    Shaaban, Abdelkader Magdy 
    ;
    Schmittner, Christoph 
    ;
    Pinzenöhler, Andreas 
    ;
    ;
    The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cyber-Physical Systems of Systems (CPSoS) for the railway sector. In order to satisfy the security requirements of Cyber-Physical Systems (CPS), domainspecific risk identification assessment procedures have been developed. Threat modelling is one of the most commonly used methods for threat identification for the security analysis of CPSoS and is capable of targeting various domains. This paper reports our experience of using a risk management framework identify the most critical security vulnerabilities in CPSoS in the domain and shows the broader impact this work can have on the domain of safety and security management. Moreover, we emphasize the application of common analytical methods for cyber-security based on international industry standards to identify the most vulnerable assets. These will be applied to a meta-model for automated railway systems in the concept phase to support the development and deployment of these systems. Furthermore, it is the first step to create a secure and standard complaint system by design.
      105  498Scopus© Citations 8
  • Publication
    A recommendation for suitable technologies for an indoor farming framework
    (Springer, 2020) ; ;
    Schmittner, Christoph 
    ;
    ;
    Christl, Korbinian 
    ;
    Knapitsch, Johannes 
    ;
    Parapatits, Martin 
    Facing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.
      600  37207Scopus© Citations 6
  • Publication
    A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
    (2019)
    Esfahani, A. 
    ;
    Mantas, G. 
    ;
    Matischek, R. 
    ;
    Saghezchi, F. 
    ;
    ; ; ;
    Schmittner, Ch. 
    ;
    Bastos, J. 
    In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the IIoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the IIoT environment. Therefore, lightweight security mechanisms are required for M2M communications in IIoT in order to reach its full potential. As a step toward this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment. The proposed mechanism is characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device's identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.
      562  933Scopus© Citations 212