Research Outputs

2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 2016 2016 2015 2015 2014 2014 2013 2013 2012 2012 0.0 0.0 1.0 1.0 2.0 2.0 3.0 3.0 4.0 4.0 5.0 5.0
Now showing 1 - 10 of 27
No Thumbnail Available
Publication

Towards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0

2017-12, Bauer, Elisabeth, Schluga, Oliver, Maksuti, Silia, Bicaku, Ani, Hofbauer, David, Ivkić, Igor, Wöhrer, Alexander, Tauber, Markus

The popularity of cloud based Infrastructure-as-a- Service (IaaS) solutions is becoming increasingly popular. However, since IaaS providers and customers interact in a flexible and scalable environment, security remains a serious concern. To handle such security issues, defining a set of security parameters in the service level agreements (SLA) between both, IaaS provider and customer, is of utmost importance. In this paper, the European Network and Information Security Agency (ENISA) guidelines are evaluated to extract a set of security parameters for IaaS. Furthermore, the level of applicability and implementation of this set is used to assess popular industrial and open-source IaaS cloud platforms, respectively VMware and OpenStack. Both platforms provide private clouds, used as backend infrastructures in Industry 4.0 application scenarios. The results serve as initial work to identify a security baseline and research needs for creating secure cloud environments for Industry 4.0.

No Thumbnail Available
Publication

Security Vulnerabilities And Risks In Industrial Usage Of Wireless Communication

2014-09-16, Plosz, S., Lesjak, C., Pereira, N., Tauber, Markus, Ruprechter, T.

Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.

No Thumbnail Available
Publication

Connected cars — Threats, vulnerabilities and their impact

2018-05, Strobl, Stefanie, Hofbauer, David, Schmittner, Christoph, Maksuti, Silia, Tauber, Markus, Delsing, Jerker

The growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats.

No Thumbnail Available
Publication

Towards Taxonomy based Software Security Standard and Tool Selection for Critical Infrastructure IT in the Cloud

2014, Paudel, S., Tauber, Markus, Brandic, I.

No Thumbnail Available
Publication

Self-Adaptation Applied to Peer-Set Maintenance in Chord via a Generic Autonomic Management Framework

2010, Tauber, Markus, Kirby, G. N. C., Dearle, A.

No Thumbnail Available
Publication

Application Level Energy and Performance Measurements in a Wireless LAN

2011, Tauber, Markus, Bhatti, S. N., Yu, Y.

We present an experimental evaluation of energy usage and performance in a wireless LAN cell based on a test bed using the 5 GHz ISM band for 802.11a and 802.11n. We have taken an application-level approach, by varying the packet size and transmission rate at the protocol level and evaluating energy usage across a range of application transmission rates using both large and small packet sizes. We have observed that both the application's transmission rate and the packet size have an impact on energy efficiency for transmission in our test bed. We also included in our experiments evaluation of the energy efficiency of emulations of YouTube and Skype flows, and a comparison with Ethernet transmissions.

No Thumbnail Available
Publication

Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework

2019-02, Maksuti, Silia, Schluga, Oliver, Settanni, Giuseppe, Tauber, Markus, Delsing, Jerker

Manufacturing enterprises are constantly exploring new ways to improve their own production processes to address the increasing demand of customized production. However, such enterprises show a low degree of flexibility, which mainly results from the need to configure new production equipment at design and run time. In this paper we propose self-adaptation as an approach to improve data transmission flexibility in Industry 4.0 environments. We implement an autonomic manager using a generic autonomic management framework, which applies the most appropriate data transmission configuration based on security and business process related requirements, such as performance. The experimental evaluation is carried out in a MQTT infrastructure and the results show that using self-adaptation can significantly improve the trade-off between security and performance. We then propose to integrate anomaly detection methods as a solution to support self-adaptation by monitoring and learning the normal behavior of an industrial system and show how this can be used by the generic autonomic management framework.

No Thumbnail Available
Publication

On the Cost of Cyber Security in Smart Business

2017-12, Ivkić, Igor, Wolfauer, Stephan, Oberhofer, Thomas, Tauber, Markus

In a world, as complex and constantly changing as ours cloud computing is a driving force for shaping the IT landscape and changing the way we do business. Current trends show a world of people, things and services all digitally interconnected via the Internet of Things (IoT). This applies in particular to an industrial environment where smart devices and intelligent services pave the way for smart factories and smart businesses. This paper investigates in a use case driven study the potential of making use of smart devices to enable direct, automated and voice-controlled smart businesses. Furthermore, the paper presents an initial investigation on methodologies for measuring costs of cyber security controls for cloud services.

No Thumbnail Available
Publication

Towards trustworthy end-to-end communication in industry 4.0

2017, Bicaku, Ani, Maksuti, Silia, Palkovits-Rauter, Silke, Tauber, Markus, Matischek, Rainer, Schmittner, Christoph, Mantas, Georgios, Thron, Mario, Delsing, Jerker

Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is focused on how to ensure trustworthy communication from the edge devices to the backend infrastructure. We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges. Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for dataexchange. We define a set of representative measurable indicator points based on existing standards and use them for automated dependability detection within the whole system.

No Thumbnail Available
Publication

Towards a Security Cost Model for Cyber-Physical Systems

2019-01, Ivkić, Igor, Mauthe, Andreas, Tauber, Markus

In times of Industry 4.0 and cyber-physical systems (CPS) providing security is one of the biggest challenges. A cyber attack launched at a CPS poses a huge threat, since a security incident may affect both the cyber and the physical world. Since CPS are very flexible systems, which are capable of adapting to environmental changes, it is important to keep an overview of the resulting costs of providing security. However, research regarding CPS currently focuses more on engineering secure systems and does not satisfactorily provide approaches for evaluating the resulting costs. This paper presents an interaction-based model for evaluating security costs in a CPS. Furthermore, the paper demonstrates in a use case driven study, how this approach could be used to model the resulting costs for guaranteeing security.