Skip to main content

Showing 1–3 of 3 results for author: Bodenhausen, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.01971  [pdf, other

    cs.CR cs.NI

    Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure

    Authors: Jörn Bodenhausen, Laurenz Grote, Michael Rademacher, Martin Henze

    Abstract: With critical infrastructure increasingly relying on wireless communication, using end-to-end security such as TLS becomes imperative. However, TLS introduces significant overhead for resource-constrained devices and networks prevalent in critical infrastructure. In this paper, we propose to leverage the degrees of freedom in configuring TLS to dynamically adapt algorithms, parameters, and other s… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

    Comments: To be published in Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet)

  2. arXiv:2311.01338  [pdf, other

    cs.NI cs.CR

    Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities

    Authors: Jörn Bodenhausen, Christian Sorgatz, Thomas Vogt, Kolja Grafflage, Sebastian Rötzel, Michael Rademacher, Martin Henze

    Abstract: Critical infrastructure constitutes the foundation of every society. While traditionally solely relying on dedicated cable-based communication, this infrastructure rapidly transforms to highly digitized and interconnected systems which increasingly rely on wireless communication. Besides providing tremendous benefits, especially affording the easy, cheap, and flexible interconnection of a large nu… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Author's version of a paper accepted for publication in Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2023)

  3. Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

    Authors: Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze

    Abstract: The ongoing trend to move industrial appliances from previously isolated networks to the Internet requires fundamental changes in security to uphold secure and safe operation. Consequently, to ensure end-to-end secure communication and authentication, (i) traditional industrial protocols, e.g., Modbus, are retrofitted with TLS support, and (ii) modern protocols, e.g., MQTT, are directly designed t… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: 15 pages, 6 figures

    Journal ref: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266