Options
Tauber, Markus
Loading...
Official Name
Tauber, Markus
Akademische Titel
Ehemaliger FH Mitarbeiter
Scopus Author ID
37058207900
Status
exstaff
Research Outputs
Now showing 1 - 2 of 2
- PublicationConnected cars — Threats, vulnerabilities and their impact(IEEE, 2018-05)
; ; ;Schmittner, Christoph; ; Delsing, JerkerThe growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats.216 1Scopus© Citations 15 - PublicationEstablishing a Chain of Trust in a Sporadically Connected Cyber-Physical System(IEEE, 2021-05)
; ; ; ;Stummer, Anna; ; ;Pirker, Dominic ;Schmittner, ChristophDelsing, JerkerDrone based applications have progressed significantly in recent years across many industries, including agriculture. This paper proposes a sporadically connected cyber-physical system for assisting winemakers and minimizing the travel time to remote and poorly connected infrastructures. A set of representative diseases and conditions, which will be monitored by land-bound sensors in combination with multispectral images, is identified. To collect accurate data, a trustworthy and secured communication of the drone with the sensors and the base station should be established. We propose to use an Internet of Things framework for establishing a chain of trust by securely onboarding drones, sensors and base station, and providing self-adaptation support for the use case. Furthermore, we perform a security analysis of the use case for identifying potential threats and security controls that should be in place for mitigating them.126 1