Buchreihe Sicherheitsforschung

2019-01-26

In der Reihe Sicherheitsforschung sind bisher 5 Bücher erschienen.

Proceedings of the DeepSec in Depth Security Conferences

Volume 1, 2015

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world’s most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

Volume 2, 2017

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world’s most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

Volume 3, 2019

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world’s most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

Fault-tolerant Industrial Wireless Mesh Network Infrastructure

Modern industrial facilities have growing demands for wireless communication. Industrial applications need a communication service which can cope with mobility and environmental dynamics while maintaining realtime service quality. The goal of this thesis is to provide a reliable communication service with end-to-end guarantees on top of Wireless Mesh Networks. Applications should be able to specify their functional and non-functional end-to-end requirements, which the infrastructure then fulfi lls. This task is challenging due to the limited throughput capacity and highly dynamic nature of the wireless medium, which includes e° ects like varying transmission rates, changing links, mobility and even ocassional node failures.The approach taken in this thesis to master these issues is to apply the methods of fault-tolerance. The solution consists of a feedback control loop which adapts the network to the infl uence of dynamic e° ects by deploying resource assessment, resource admissi-on and resource provision. The control loop is combined with proactive measures which prevent service failures in the time between a fault occurs and is properly handled by the control loop.The developed mechanisms are implemented on top of the existing AWDS routing protocol. Crosslayerinterfaces to lower layers are used for obtaining more precise and timely information. The infrastructure provides an application interface for requesting QoS guarantees, and ensures their enforcement. The infrastructure is evaluated in an industrial application scenario, where a mobile robot is remote-controlled using live video and sensory feedback. This high-bandwidth real-time application is competing for medium access with background data streams. The evaluation shows that it is possible to control the robot without interruptions or service failures when all implemented components are active. At the sametime, the deactivation of any of the building blocks severely reduces the achievable service quality, showing their respective necessity. Therefore, the presented works uccessfully solves the challenge of providing a communication backbone for dynamic industrial environments. It therefore enables the introduction of high-bandwidth mobile applications like tele-robotics and augmented reality in industrial automation.

Informationstechnologie und Sicherheitspolitik

Informationstechnologie verändert seit mehreren Jahrzehnten nicht nur technische Handlungsfelder, sondern auch gesellschaftliche. Insbesondere in der Außen- und Sicherheitspolitik wird unter dem Stichwort ‘Cyberwar’ das Gefährdungspotenzial von IT und Computern diskutiert. Außerdem werden Kriegsspiele im Cyberspace durchgeführt und mögliche Angriffs- und Verteidigungsstrategien entworfen. Dieses Buch beschäftigt sich daher mit dem Verhältnis von Informationstechnologie und Sicherheitspolitik und deren wechselseitigen Einflüssen. Es stellt die zwingend notwendigen technischen Grundlagen sowie aktuelle sicherheitspolitische Diskussionen vor. Dabei wird insbesondere der Frage nachgegangen, ob es einen Cyberwar gibt und welche Konsequenzen Cyber-Aggressionen hätten.