Skip Navigation

Barkhausen Institut

Trustworthy​ Data Processing

Unser Ziel

Das Ziel der Gruppe Trustworthy​ Data Processing ist die Entwicklung einer Plattform, die eine vertrauenswürdige und datenschutzgerechte Datenverarbeitung für IoT-Anwendungen ermöglicht. Dazu gehört zum einen die Erstellung von technischen Basis-Bausteinen, die sich leicht zu einer Gesamtlösung integrieren lassen. Zum anderen geht es darum, durch eine holistische Sichtweise eine ganzheitliche Lösung zu schaffen, die neben den technischen Aspekten auch ökonomische, rechtliche und organisatorische Maßnahmen umfasst.

Unsere Lösungsstrategie besteht in der Zerlegung des Gesamtsystems in sicherheitskritische und nicht-sicherheitskritische Komponenten. Wir bauen somit unmittelbar auf den Ergebnissen der Composability HW/SW auf und leisten gleichzeitig einen Beitrag zur Weiterentwicklung dieses Key Principles. Wir werden Verfahren entwickeln, die einen sicheren Austausch kryptographischer Schlüssel für den stark heterogene Anwendungsbereich IoT ermöglichen. Dabei integrieren wir die Ergebnisse der Sicherheit auf der physikalischen Schicht in ein Gesamtsicherheitskonzept. Darüber hinaus beschäftigen wir uns mit Methoden für sichere Updates, um insbesondere die sicherheitskritischen Komponenten stets aktuell zu halten.

Im Bereich des Datenschutzes entwickeln wir Komponenten und Protokolle, mit denen eine sinnvolle Balance zwischen Datenschutz und Funktionalität (Nützlichkeit) erzielt werden kann. Wir widmen uns der Umsetzung neuartiger Datenschutzziele wie etwa Transparenz und Intervenierbarkeit.

Unser Team

Stefan Köpsell
Dr.-Ing.Stefan KöpsellResearch Group Leader
Maryam Zarezadeh
PhDMaryam ZarezadehSenior Researcher
Yevhen Zolotavkin
PhDYevhen ZolotavkinSenior Researcher
Tianxiang Dai
Dr.-Ing.Tianxiang DaiASSOCIATE RESEARCHER
Prajnamaya Dass
PhDPrajnamaya DassAssociate Researcher
Jana Eisoldt
M.Sc.Jana EisoldtAssociate Researcher
Moritz Jasper
Dipl. Ing.Moritz JasperAssociate Researcher
Ali Khandan Boroujeni
M.Sc.Ali Khandan BoroujeniAssociate Researcher
Mahshid Mehrabi
Dr.-Ing.Mahshid MehrabiAssociate Researcher
Richard Riedel
M. Sc.Richard RiedelAssociate Researcher

Publikationen

Mahshid Mehrabi, Ali Khandan Boroujeni, Vincent Latzko, Stefan Köpsell, Towards Deploying Secure and highly available O-RAN components, Proceedings 2024 IEEE Future Networks World Forum (FNWF), 2024

@inproceedings{
deplyoment_o_ran2024,
title = "Towards Deploying Secure and highly available O-RAN components",
author = "Mahshid Mehrabi, Ali Khandan Boroujeni, Vincent Latzko, Stefan Köpsell",
year = "2024",
booktitle = "Proceedings 2024 IEEE Future Networks World Forum (FNWF)"
}
Download BibTex

Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten, Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal, 4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024), 2024

@inproceedings{
RoPa_2024,
title = "Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal",
author = "Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten",
year = "2024",
booktitle = "4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024)",
author_text = "Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten"
}
Download BibTex

Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell, Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security, Global Information Infrastructure and Networking Symposium (GIIS'24), 2024

@inproceedings{
BaBoK_2024,
title = "Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security",
author = "Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell",
year = "2024",
booktitle = "Global Information Infrastructure and Networking Symposium (GIIS'24)"
}
Download BibTex

Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell, Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach, 4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024), 2024

@inproceedings{
BoBaK_2024,
title = "Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach",
author = "Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell",
year = "2024",
booktitle = "4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024)"
}
Download BibTex

Mohammad Nosouhi, Syed Wajid Ali Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss, Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism, IEEE Transactions on Information Forensics and Security, 2023

@article{
NoSh_2023,
title = "Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism",
author = "Mohammad Nosouhi, Syed Wajid Ali Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss",
year = "2023",
journal = "IEEE Transactions on Information Forensics and Security",
volume = "18",
pages = "2160-2174"
}
Download BibTex

Jongkil Jeong, Yevhen Zolotavkin, Robin Doss, Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis, ACM Computing Surveys, ACM Computing Surveys, 2023

@article{
JeZoD_2023,
title = "Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis",
author = "Jongkil Jeong, Yevhen Zolotavkin, Robin Doss",
year = "2023",
journal = "ACM Computing Surveys",
booktitle = "ACM Computing Surveys",
month = "January",
number = "1",
volume = "55"
}
Download BibTex

Moritz Jasper, Stefan Köpsell, Secure and Dynamic Publish/Subscribe: LCMsec, 98th IEEE Vehicular Technology Conference, VTC Fall 2023, 2023

@inproceedings{
JaKö_2023,
title = "Secure and Dynamic Publish/Subscribe: LCMsec",
author = "Moritz Jasper, Stefan Köpsell",
year = "2023",
booktitle = "98th IEEE Vehicular Technology Conference, VTC Fall 2023"
}
Download BibTex

Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell, Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation, 9th International Conference on Information Systems Security and Privacy (ICISSP'23), 2023

@inproceedings{
ZoBa_2024,
title = "Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation",
author = "Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell",
year = "2023",
booktitle = "9th International Conference on Information Systems Security and Privacy (ICISSP'23)"
}
Download BibTex

Geoffroy Couteau, Maryam Zarezadeh, Non-interactive Secure Computation of Inner-Product from LPN and LWE, Advances in Cryptology – ASIACRYPT 2022, 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022

@inproceedings{
CoZa_2022,
title = "Non-interactive Secure Computation of Inner-Product from LPN and LWE",
author = "Geoffroy Couteau, Maryam Zarezadeh",
year = "2022",
booktitle = "Advances in Cryptology – ASIACRYPT 2022, 28th International Conference on the Theory and Application of Cryptology and Information Security"
}
Download BibTex

Sebastian Haas, Mattis Hasler, Friedrich Pauls, Stefan Köpsell, Nils Asmussen, Michael Roitzsch, Gerhard Fettweis, Trustworthy Computing for O-RAN: Security in a Latency-Sensitive Environment, 2nd Workshop On Architectural Evolution Toward 6G Networks - 6GARCH, 2022 , Download PDF

@inproceedings{
m3oran-haas,
title = "Trustworthy Computing for O-RAN: Security in a Latency-Sensitive Environment",
author = "Sebastian Haas, Mattis Hasler, Friedrich Pauls, Stefan Köpsell, Nils Asmussen, Michael Roitzsch, Gerhard Fettweis",
year = "2022",
booktitle = "2nd Workshop On Architectural Evolution Toward 6G Networks - 6GARCH",
month = "December",
pages = "1-6"
}
Download BibTex

Friedrich Pauls, Sebastian Haas, Stefan Köpsell, Michael Roitzsch, Nils Asmussen, Gerhard Fettweis, On Trustworthy Scalable Hardware/Software Platform Design, Smart Systems Integration Conference and Exhibition (SSI), 2022 , Download PDF

@inproceedings{
hwswplatform_pauls2022,
title = "On Trustworthy Scalable Hardware/Software Platform Design",
author = "Friedrich Pauls, Sebastian Haas, Stefan Köpsell, Michael Roitzsch, Nils Asmussen, Gerhard Fettweis",
year = "2022",
booktitle = "Smart Systems Integration Conference and Exhibition (SSI)",
month = "April"
}
Download BibTex

Holger Boche, Rafael Schaefer, Vincent Poor, Gerhard Fettweis, Trustworthiness Verification and Integrity Testing for Wireless Communication Systems, Proceedings of 2022 IEEE International Conference on Communications (ICC 2022), 2022

{ title = "Trustworthiness Verification and Integrity Testing for Wireless Communication Systems", author = "Holger Boche, Rafael F. Schaefer, H. Vincent Poor, Gerhard p. Fettweis", year = "2022"}

@conference{
Fettweis_ICC_2022,
title = "Trustworthiness Verification and Integrity Testing for Wireless Communication Systems",
author = "Holger Boche, Rafael Schaefer, Vincent Poor, Gerhard Fettweis",
year = "2022",
booktitle = "Proceedings of 2022 IEEE International Conference on Communications (ICC 2022)"
}
Download BibTex

Stephan Escher, Markus Sontowski, Stefan Köpsell, How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme, Proceedings VTC2021-Spring, 2021

@inproceedings{
EsKS_2021,
title = "How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme",
author = "Stephan Escher, Markus Sontowski, Stefan Köpsell",
year = "2021",
booktitle = "Proceedings VTC2021-Spring"
}
Download BibTex

Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig, Enabling and Optimizing MACsec for Industrial Environments, IEEE Transactions on Industrial Informatics, 2020

@article{
LaGa_2020,
title = "Enabling and Optimizing MACsec for Industrial Environments",
author = "Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig",
year = "2020",
journal = "IEEE Transactions on Industrial Informatics",
doi = "10.1109/TII.2020.3040966",
url = "https://ieeexplore.ieee.org/abstract/document/9272319"
}
Download BibTex

Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig, Enabling and Optimizing MACsec for Industrial Environments, Proc. 16th IEEE International Conference on Factory Communication Systems (WFCS), 2020

@inproceedings{
LaGH_2020,
title = "Enabling and Optimizing MACsec for Industrial Environments",
author = "Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig",
year = "2020",
booktitle = "Proc. 16th IEEE International Conference on Factory Communication Systems (WFCS)",
publisher = "IEEE",
pages = "1--4",
doi = "10.1109/WFCS47810.2020.9114434",
url = "https://doi.org/10.1109/WFCS47810.2020.9114434"
}
Download BibTex

Marco Zoli, André Barreto, Stefan Köpsell, Padmanava Sen, Gerhard Fettweis, Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation, EURASIP Journal on Wireless Communications and Networking, 2020 , Download PDF

@article{
Zoli_2020_JWCN,
title = "Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation",
author = "Marco Zoli, André Barreto, Stefan Köpsell, Padmanava Sen, Gerhard Fettweis",
year = "2020",
journal = "EURASIP Journal on Wireless Communications and Networking",
month = "June",
number = "114",
pages = "24",
url = "https://doi.org/10.1186/s13638-020-01712-6",
doi = "10.1186/s13638-020-01712-6"
}
Download BibTex