Research Outputs

2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 2016 2016 2015 2015 2014 2014 2013 2013 2012 2012 0.0 0.0 1.0 1.0 2.0 2.0 3.0 3.0 4.0 4.0 5.0 5.0
Now showing 1 - 10 of 29
No Thumbnail Available
Publication

Towards Taxonomy based Software Security Standard and Tool Selection for Critical Infrastructure IT in the Cloud

2014, Paudel, S., Tauber, Markus, Brandic, I.

No Thumbnail Available
Publication

Generic Autonomic Management as a Service in a SOA-based Framework for Industry 4.0

2019-10, Maksuti, Silia, Tauber, Markus, Delsing, Jerker

Cyber-physical production systems are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. In order to make these systems interoperable with each other for addressing Industry 4.0 applications a number of service-oriented architecture frameworks are developed. Such frameworks are composed by a number of services, which are inherently dynamic by nature and thus imply the need for self-adaptation. In this paper we propose generic autonomic management as a service and show how it can be integrated in the Arrowhead framework. We propose generic and reusable interfaces for each phase of the autonomic control loop in order to increase the usability of the service for other frameworks and application systems, while reducing the software engineering effort. To show the utility of our approach in the Arrowhead framework we use a climate control application as a representative example.

No Thumbnail Available
Publication

Towards continuous Cloud Service Assurance for Critical Infrastructure IT

2014-08-27, Hudic, A., Mauthe, A., Caceres, S., Hecht, T., Tauber, Markus

The momentum behind Cloud Computing has revolutionized how ICT services are provided, adopted and delivered. Features such as high scalability, fast provisioning, on demand resource availability makes it an attractive proposition for deploying complex and demanding systems. Clouds are also very suitable for deploying systems with unpredictable load patterns including Critical infrastructure services. Though, the major obstacle in hosting Critical infrastructures is often a lack of assurance. The transparency and flexibility offered by the Cloud, abstracts per definition over e.g. data placement, hardware, service migration. This makes it very hard to assure security properties. We present an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents our approach.

No Thumbnail Available
Publication

Low RSSI in WLANs: Impact on Application-Level Performance

2013, Tauber, Markus, Bhatti, S. N.

No Thumbnail Available
Publication

Categorization of Standards, Guidelines and Tools for Secure System Design for Critical Infrastructure IT in the Cloud

2015, Paudel, S., Tauber, Markus, Wagner, C., Hudic, A., Ng, Wee-Kong

With the increasing popularity of cloud computing, security in cloud-based applications is gaining awareness and is regarded as one of the most crucial factors for the long term success of such applications. Despite all benefits of cloud computing, its fate lies in its success in gaining trust from its users achieved by ensuring cloud services being built in a safe and secure manner. This work evaluates existing security standards and tools for creating Critical Infrastructure (CI) services in cloud environments -- often implemented as cyber physical systems (CPS). We also identify security issues from a literature review and from a show case analysis. Furthermore, we analyse and evaluate how mitigation options for identified open security issues for CI in the cloud point to individual aspects of standards and guidelines to support the creation of secure CPS/CI in the cloud. Additionally, we presented the results in a multidimensional taxonomy based on the mapping of the issues and the standards and tools. We show which areas require the attention as they are currently not covered completely by existing standards, guidelines and tools.

No Thumbnail Available
Publication

Towards a Security Cost Model for Cyber-Physical Systems

2019-01, Ivkić, Igor, Mauthe, Andreas, Tauber, Markus

In times of Industry 4.0 and cyber-physical systems (CPS) providing security is one of the biggest challenges. A cyber attack launched at a CPS poses a huge threat, since a security incident may affect both the cyber and the physical world. Since CPS are very flexible systems, which are capable of adapting to environmental changes, it is important to keep an overview of the resulting costs of providing security. However, research regarding CPS currently focuses more on engineering secure systems and does not satisfactorily provide approaches for evaluating the resulting costs. This paper presents an interaction-based model for evaluating security costs in a CPS. Furthermore, the paper demonstrates in a use case driven study, how this approach could be used to model the resulting costs for guaranteeing security.

No Thumbnail Available
Publication

Establishing a Chain of Trust in a Sporadically Connected Cyber-Physical System

2021-05, Maksuti, Silia, Pickem, Michael, Zsilak, Mario, Stummer, Anna, Tauber, Markus, Wieschhoff, Marcus, Pirker, Dominic, Schmittner, Christoph, Delsing, Jerker

Drone based applications have progressed significantly in recent years across many industries, including agriculture. This paper proposes a sporadically connected cyber-physical system for assisting winemakers and minimizing the travel time to remote and poorly connected infrastructures. A set of representative diseases and conditions, which will be monitored by land-bound sensors in combination with multispectral images, is identified. To collect accurate data, a trustworthy and secured communication of the drone with the sensors and the base station should be established. We propose to use an Internet of Things framework for establishing a chain of trust by securely onboarding drones, sensors and base station, and providing self-adaptation support for the use case. Furthermore, we perform a security analysis of the use case for identifying potential threats and security controls that should be in place for mitigating them.

No Thumbnail Available
Publication

The Case for Heterogeneous WLAN Environments for Converged Networks

2013, Tauber, Markus, Bhatti, S. N., Melnikov, N., Schoenwaelder, J.

No Thumbnail Available
Publication

Autonomic Management of Client Concurrency in a Distributed Storage Service

2011, Tauber, Markus, Kirby, G. N. C., Dearle, A.

No Thumbnail Available
Publication

Towards trustworthy end-to-end communication in industry 4.0

2017, Bicaku, Ani, Maksuti, Silia, Palkovits-Rauter, Silke, Tauber, Markus, Matischek, Rainer, Schmittner, Christoph, Mantas, Georgios, Thron, Mario, Delsing, Jerker

Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is focused on how to ensure trustworthy communication from the edge devices to the backend infrastructure. We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges. Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for dataexchange. We define a set of representative measurable indicator points based on existing standards and use them for automated dependability detection within the whole system.