Thomas C. Schmidt

ORCID: 0000-0002-0956-7885
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • IPv6, Mobility, Handover, Networks, Security
  • Network Security and Intrusion Detection
  • Opportunistic and Delay-Tolerant Networks
  • Internet Traffic Analysis and Secure E-voting
  • Peer-to-Peer Network Technologies
  • IoT and Edge/Fog Computing
  • Cooperative Communication and Network Coding
  • Multimedia Communication and Technology
  • Network Time Synchronization Technologies
  • Real-Time Systems Scheduling
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Advanced Data Storage Technologies
  • Advanced Malware Detection Techniques
  • Wireless Networks and Protocols
  • Vehicular Ad Hoc Networks (VANETs)
  • IoT Networks and Protocols
  • Mobile Ad Hoc Networks
  • Network Packet Processing and Optimization
  • Mobile Agent-Based Network Management
  • Video Coding and Compression Technologies
  • Energy Efficient Wireless Sensor Networks
  • Distributed systems and fault tolerance
  • Bluetooth and Wireless Communication Technologies

HAW Hamburg
2016-2025

Universität Hamburg
2016-2025

Hamburg University of Technology
2024

Deutsches Elektronen-Synchrotron DESY
2024

Barkhausen Institute
2023-2024

TU Dresden
2010-2024

NetScout (United States)
2024

University of Regensburg
2022

ORCID
2021

Korea Institute for Industrial Economics and Trade
2016

The Internet of Things (IoT) is characterized by heterogeneous devices. They range from very lightweight sensors powered 8-bit microcontrollers (MCUs) to devices equipped with more powerful, but energy-efficient 32-bit processors. Neither a traditional operating system (OS) currently running on hosts, nor typical OS for sensor networks are capable fulfill the diverse requirements such wide To leverage IoT, redundant development should be avoided and maintenance costs reduced. In this paper...

10.1109/infcomw.2013.6970748 preprint EN 2013-04-01

This paper explores the feasibility, advantages, and challenges of an ICN-based approach in Internet Things. We report on first NDN experiments a life-size IoT deployment, spread over tens rooms several floors building. Based insights gained with these experiments, analyses shortcomings CCN applied to IoT. Several interoperable enhancements are then proposed evaluated. significantly decreased control traffic (i.e., interest messages) leverage data path caching match requirements terms energy...

10.1145/2660129.2660144 preprint EN 2014-09-23

As the Internet of Things (IoT) emerges, compact operating systems (OSs) are required on low-end devices to ease development and portability IoT applications. RIOT is a prominent free open source OS in this space. In paper, we provide first comprehensive overview RIOT. We cover key components interest potential developers users: kernel, hardware abstraction, software modularity, both conceptually practice for various example configurations. explain operational aspects like system boot-up,...

10.1109/jiot.2018.2815038 article EN IEEE Internet of Things Journal 2018-03-13

In this survey, we give an extensive overview on honeypots. This includes not only honeypot software but also methodologies to analyse data.

10.48550/arxiv.1608.06249 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Real-time extensions to standard switched Ethernet widen the realm of computer networking into time-critical domain. These technologies have started establish in process automation, while Ethernet-based communication infrastructures vehicles are novel and challenged by particularly hard real-time constraints. Simulation tools vital importance explore technical feasibility facilitate distributed vehicle infrastructure design.This paper introduces an extension OMNeT++ INET framework for...

10.5555/2151054.2151120 article EN Simulation Tools and Techniques for Communications, Networks and System 2011-03-21

Real-time extensions to standard Ethernet widen the realm of computer networking into time-critical domain. These technologies have started establish in process automation, while Ethernet-based infrastructures vehicles are novel and challenged by hard real-time constraints. Simulation tool

10.4108/icst.simutools.2011.245510 article EN 2011-01-01

The IPv6 Routing Protocol for Low-Power and Lossy Networks was recently introduced as the new routing standard Internet of Things. Although RPL defines basic security modes, it remains vulnerable to topological attacks which facilitate blackholing, interception, resource exhaustion. We are concerned with analyzing corresponding threats protecting future deployments from such attacks. Our contributions twofold. First, we analyze state art, in particular protective scheme VeRA present two rank...

10.5555/2893711.2893721 article EN 2016-02-15

The critical remote-code-execution (RCE) Log4Shell is a severe vulnerability that was disclosed to the public on December 10, 2021. It exploits bug in wide-spread Log4j library. Any service uses library and exposes an interface Internet potentially vulnerable. In this paper, we measure rush of scanners during two months after disclosure. We use several vantage points observe both researchers attackers. For purpose, collect analyze payloads sent by benign malicious communication parties,...

10.48550/arxiv.2205.02544 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Ethernet-based in-car communication is currently a hot topic in the automotive industry. Soon Ethernet will start to oust MOST bus its domain of info- and entertainment applications. However, full benefit technologically integrated network only become rewarding with deployment an backbone that integrates all domains on single layer at increased bandwidth, reduced complexity cost, while opening car intelligence for future innovations. Such must transport critical control data real-time....

10.1109/vtcfall.2012.6398932 article EN 2012-09-01

In-car networks based on Ethernet are expected to be the first choice for future applications in domain of info-and entertainment. However, full benefit a technologically integrated in-car network will only become rewarding with an Ethernet-based backbone, unifying several automotive domains single infrastructure. Today, there is remarkable interest IEEE 802.1 Audio/Video Bridging (AVB) protocol suite, that provides end-to-end performance guarantees networks. But strict timing requirements...

10.1109/vnc.2013.6737589 article EN 2013-12-01

The Routing Protocol for Low-Power and Lossy Networks (RPL) is a proposed standard by the Internet Engineering Task Force (IETF). Although RPL defines basic security modes, it still subject to topology attacks. VeRA an authentication scheme which protects against attacks, based on version number rank. This work presents two rank attacks are not mitigated VeRA. In first attack, adversary can decrease its arbitrarily. Hence, impersonate even root node. second that of any node within access...

10.1109/infcomw.2013.6970745 article EN 2013-04-01

Reproducibility is key to rigorous scientific progress. However, many publications in the computer networks community lack support for reproducibility. In this paper, we argue that mainly rooted additional effort authors need spend, without expecting sufficient benefits. Based on our experience both authoring reproducible research and reproducing publications, propose an ecosystem incentivizes reproducers invest effort. This consists of various building blocks, which can be combined into...

10.1145/3097766.3097768 article EN 2017-08-10

This paper takes a comprehensive view on the protocol stacks that are under debate for future Internet of Things (IoT). It addresses holistic question which solution is beneficial common IoT use cases. We deploy NDN and two popular IP-based application protocols, CoAP MQTT, in its different variants large-scale testbed single- multi-hop scenarios. analyze cases scheduled periodic unscheduled traffic varying loads. Our findings indicate (a) admits most resource-friendly deployment nodes, (b)...

10.1145/3267955.3267967 preprint EN 2018-09-21

Energy efficiency is a major driving factor in the Internet of Things (IoT). In this context, an IoT approach based on Information-Centric Networking (ICN) offers prospects for low energy consumption. Indeed, ICN can provide local in-network content caching so that relevant remains available at any time while devices are deep-sleep mode most time. paper, we evaluate NDN enhanced with CoCa, simple side protocol designed to exploit names together smart interplay between cooperative and...

10.1145/3125719.3125732 preprint EN 2017-09-19

In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore implications exposing certificate DNS names from perspective security privacy. We find that certificates in CT logs have seen exponential growth. Website support for has also constantly increased, with now 33% established connections supporting CT. With increasing deployment CT, there are concerns information leakage due to all being visible logs. To understand threat, introduce a honeypot show...

10.1145/3278532.3278562 preprint EN 2018-10-31

Future in-vehicular networks will be based on Ethernet. The IEEE Time-Sensitive Networking (TSN) is a promising candidate to satisfy real-time requirements in future car communication. Software-Defined (SDN) extends the Ethernet control plane with programming option that can add much value resilience, security, and adaptivity of automotive environment. In this work, we derive first concept for combining along an initial evaluation. Our measurements are performed via simulation investigates...

10.1109/vtcspring.2019.8746473 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2019-04-01

Current designs of future In-Vehicle Networks (IVN) prepare for switched Ethernet backbones, which can host advanced LAN technologies such as IEEE Time-Sensitive Networking (TSN) and Software-Defined (SDN). In this paper, we present an integrated (TSSDN) architecture that simultaneously enables control synchronous asynchronous real-time best-effort communication all IVN traffic classes. Despite the central SDN controller, validate operate without a delay penalty TSN traffic, provided...

10.1109/tvt.2022.3202368 article EN IEEE Transactions on Vehicular Technology 2022-08-29

Prefix hijacking has always been a big concern in the Internet. Some events made it into international world-news, but most of them remain unreported or even unnoticed. The scale problem can only be estimated.

10.1145/2342356.2342381 article EN 2012-08-13

The severity of amplification attacks has grown in recent years. Since 2013 there have been at least two which involved over 300Gbps attack traffic. This paper offers an analysis these and many other attacks. We compare a wide selection different proposals for detecting preventing attacks, as well tracing the attackers. source IP spoofing plays important part almost all mentioned, survey on state art defenses is also presented. work acts introduction into address spoofing. By combining...

10.48550/arxiv.1505.07892 preprint EN other-oa arXiv (Cornell University) 2015-01-01

The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently introduced as the new routing standard Internet of Things. Although RPL defines basic security modes, it remains vulnerable to topological attacks which facilitate blackholing, interception, resource exhaustion. We are concerned with analyzing corresponding threats protecting future deployments from such attacks. Our contributions twofold. First, we analyze state art, in particular protective scheme VeRA present...

10.48550/arxiv.1312.0984 preprint EN other-oa arXiv (Cornell University) 2013-01-01
Coming Soon ...