Jochen Schiller - Profile on Academia.edu (original) (raw)
Papers by Jochen Schiller
SAFEST - Social-Area framework for early security triggers at airports : Teilprojekt: Sensorik und Wissensfusion zum Schutz von Verkehrsinfrastrukturen unter gesellschaftlichen Randbedingungen : Abschlussbericht : Berichtszeitraum: 1. Mai 2012 bis 30. September 2015
Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis
Network and Distributed System Security Symposium, 2013
A fundamental change in the Internet backbone routing started in January 2011: The Resource Publi... more A fundamental change in the Internet backbone routing started in January 2011: The Resource Public Key Infrastructure (RPKI) has officially been deployed by the Regional Internet Registries. It leverages the validation of BGP prefix updates based on cryptographically verified data and may lead to secure inter-domain routing at last. In this talk, we present RTRlib, a highly efficient reference C implementation of the RPKI router part. We deploy RTRlib and conduct a long-term measurement using live BGP streams to evaluate the current impact of RPKI-based prefix origin validation on BGP routers. We observe that most of the invalid prefixes are most likely the result of misconfiguration. RTRlib is the only openly available tool for monitoring RPKI validation activities in real-time. We measure a relatively small overhead of origin validation on commodity hardware (5% more RAM than required for full BGP table support, 0.41% load in case of ⇡ 92,000 prefix updates per minute).
Names are the cornerstone of every Information-Centric Network (ICN), nonetheless, namespace mana... more Names are the cornerstone of every Information-Centric Network (ICN), nonetheless, namespace management has been by far neglected in ICN. A global and scalable namespace management approach is a challenge which not only concerns technical, but also requires attention to non-technical, e.g., organizational issues. In this paper, we present both a clear position on namespace management in ICN and preliminary work on a potential solution. We conceptualize a namespace management system for hierarchical names and introduce a prototype for NDN, which leverages existing DNSSEC equipped DNS infrastructure. Based on this, we are able to implement both technical and non-technical aspects of namespace management. We consider lessons learned and pitfalls from decades of the ever-evolving development of domain name system. As the de facto standard namespace management for the Internet, it is an integral orientation factor for both our concept and its implementation.
Sicherheitsforschung im Dialog
Perspektiven der Sicherheitsforschung
Peter Lang D eBooks, Apr 9, 2012
Wireless and Mobile Communications
IGI Global eBooks, Jan 18, 2011
This chapter introduces different wireless and mobile communication systems that represent an imp... more This chapter introduces different wireless and mobile communication systems that represent an important technological basis for ubiquitous computing applications. Different communication systems co-exist and vary with respect to many parameters, such as transmission range, data rates, cost, mobility, power consumption, scalability in the number of users, and so forth. The introduction gives a quick chapter overview of prominent communication systems. Next, the necessary minimal knowledge required about wireless transmission and media-sharing technologies is provided. The core of the chapter then provides brief introductions to the classes of wireless networks that are most relevant for ubiquitous computing, in particular wireless wide area networks and wireless distribution, local area, personal area, and sensor networks. A brief description of current convergence efforts follows. Readers should be aware that the wealth of technologies to be considered requires this chapter to remain rather survey-like.
Sicherheit als symbolisches Gut
Peter Lang eBooks, Jul 11, 2016
Drahtlose Kommunikation: Grenzenlose Möglichkeiten auf Kosten der Sicherheit?
Peter Lang eBooks, Jul 11, 2016
Vorwort: Hartfrid Wolff, MdB (FDP), Dr. Konstantin von Notz, MdB (Bündnis 90/Die Grünen) Steuerungskreis Forschungsforum Öffentliche Sicherheit
Peter Lang eBooks, Jul 11, 2016
Ergebnisse interdisziplinärer Risiko- und Sicherheitsforschung
Die Printversion ist zu beziehen per Email über die Hochschulschriftenstelle der Universitätsbibl... more Die Printversion ist zu beziehen per Email über die Hochschulschriftenstelle der Universitätsbibliothek der FU Berlin (
CRC Press eBooks, Dec 15, 2012
Figure 20.1 Centralized data processing vs. decentralized event detection. 442 ■ Intelligent Sens... more Figure 20.1 Centralized data processing vs. decentralized event detection. 442 ■ Intelligent Sensor Networks Event detection allows for a wireless sensor network to reliably detect application-specific events based on data sampled from the environment. Events, in this context, may range from the comparatively easy to detect outbreak of a fire to the more complex stumbling and falling of a patient, or even to an intrusion into a restricted area. Distributed event detection leverages the data processing capability of the sensor nodes in order to locally extract semantically meaningful information from the sensed data. This process may involve one or multiple nodes in a given region of the deployment, and generally avoids data transmissions to the base station of the network. This in turn reduces the overall energy consumption and ultimately leads to a prolonged lifetime of the network. In this chapter, we motivate the need for in-network data processing and event detection, and briefly review the current state of the art. We then present in detail our own approach to distributed event detection and discuss hardware platform, software architecture, and algorithms and protocols used in the detection process. Our approach has been tested extensively in several real-world deployments and we give an overview of the results from these experiments. The results illustrate how distributed event detection can achieve both high accuracy and energy efficiency, and thus mark the advantages of this approach to data processing in sensor networks.
IEEE Transactions on Mobile Computing, Aug 1, 2019
As a step towards ubiquitous and mobile computing, a decentralized localization platform allows p... more As a step towards ubiquitous and mobile computing, a decentralized localization platform allows positioning for objects and persons. The decentralized computation of the position enables to shift the application-level knowledge into a Mobile Station (MS) and avoids the communication with a remote device such as a server. In addition, computing a position on resource-constrained devices is challenging due to the restricted storage, computing capacity and power supply. Therefore, we propose suitable algorithms to compute unoptimized as well as optimized positions on resource-limited MSs. Algorithms for unoptimized positions will be analyzed with respect to the stability, complexity, and memory requirements. The calculated positions are optimized by using the Gauss-Newton (GNM) or Levenberg-Marquardt methods (LVMs). We analyze and compare the GNM with two variants of the LVM algorithm. Furthermore, we develop an adaptive algorithm for the position optimization, which is based on the Singular Value Decomposition (SVD), LVM algorithm, and the Dilution of Precision. This method allows an adaptive selection mechanism for the LVM algorithm. The influence and choice of the right parameter combination of the LVM algorithm will be analyzed and discussed. Finally, we design and evaluate a method to reduce multipath errors on the MS.
Encyclopedia of Geography, Nov 17, 2014
Location Management (LM) has become a diverse and broad field for research, and Location Based Se... more Location Management (LM) has become a diverse and broad field for research, and Location Based Services (LBS) are the "Application Layer" of LM. Research areas for LM include LM in Wireless Networks, Ad-hoc networks, WiFi, 802.15, WiMax, and mostly; cellular networks. The integration of IP (especially IPv6) into LM is the hottest topic of today. This survey paper tends to introduce the reader to the latest research on LM in Wireless Data Networks and explore the various technologies under research and construction.
A Survey of current Approaches towards Specification and Management of Quality of Service for Web Services
PIK. Praxis der Informationsverarbeitung und Kommunikation, Sep 1, 2004
... 9, D-14195 Berlin, Germany {tian, gramm, hritter, schiller, winter}@inf.fu-berlin.de ... Veri... more ... 9, D-14195 Berlin, Germany {tian, gramm, hritter, schiller, winter}@inf.fu-berlin.de ... Verity: A QoS Metric for Selecting Web Services and Providers1st Web Services Quality Workshop (WQW 2003), in ... 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI'04), Sep. ...
Peter Lang eBooks, Jul 11, 2016
Risikowahrnehmung in der Bevölkerung-Implikationen für das Sicherheitsempfinden Ortwin Renn Zusam... more Risikowahrnehmung in der Bevölkerung-Implikationen für das Sicherheitsempfinden Ortwin Renn Zusammenfassung: Die Diskrepanz zwischen den statistisch errechneten Risiken und der intuitiven Risikowahrnehmung ist vor allem bei Risiken, die auf Sicherheit und Gesundheit einwirken, besonders hoch. Das liegt zum einen an der Komplexität der jeweils vorhandenen Ursache-Wirkungsketten, die oft kontra-intuitiv und wenig plausibel sind, zum anderen an psychologischen und sozialen Verarbeitungsmechanismen von Risikoinformationen. Der Artikel beschreibt diese Wahrnehmungprozesse in einem Ablaufschema von der Aufnahme von Signalen bis zu ihrer Umsetzung in mentale und auch verhaltensleitende Reaktionen. Das Ziel ist dabei, die Mechanismen zu verdeutlichen, die einer angemessenen und konsistenten Urteilsbildung entgegenstehen.
Freiheit und Innere Sicherheit?
Peter Lang eBooks, Jul 11, 2016
Wie viel Unsicherheit ertragen wir?
Peter Lang eBooks, Jul 11, 2016
Technik- und naturwissenschaftliche Perspektiven der Sicherheitsforschung
Peter Lang eBooks, Jul 11, 2016
Lars Gerhold, Marie-Luise Beck, Jochen Schiller: Zwischen Sicherheit und Unsicherheit: Herausforderungen eines interdisziplinären Diskursfeldes
Peter Lang eBooks, Jul 11, 2016
SAFEST - Social-Area framework for early security triggers at airports : Teilprojekt: Sensorik und Wissensfusion zum Schutz von Verkehrsinfrastrukturen unter gesellschaftlichen Randbedingungen : Abschlussbericht : Berichtszeitraum: 1. Mai 2012 bis 30. September 2015
Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis
Network and Distributed System Security Symposium, 2013
A fundamental change in the Internet backbone routing started in January 2011: The Resource Publi... more A fundamental change in the Internet backbone routing started in January 2011: The Resource Public Key Infrastructure (RPKI) has officially been deployed by the Regional Internet Registries. It leverages the validation of BGP prefix updates based on cryptographically verified data and may lead to secure inter-domain routing at last. In this talk, we present RTRlib, a highly efficient reference C implementation of the RPKI router part. We deploy RTRlib and conduct a long-term measurement using live BGP streams to evaluate the current impact of RPKI-based prefix origin validation on BGP routers. We observe that most of the invalid prefixes are most likely the result of misconfiguration. RTRlib is the only openly available tool for monitoring RPKI validation activities in real-time. We measure a relatively small overhead of origin validation on commodity hardware (5% more RAM than required for full BGP table support, 0.41% load in case of ⇡ 92,000 prefix updates per minute).
Names are the cornerstone of every Information-Centric Network (ICN), nonetheless, namespace mana... more Names are the cornerstone of every Information-Centric Network (ICN), nonetheless, namespace management has been by far neglected in ICN. A global and scalable namespace management approach is a challenge which not only concerns technical, but also requires attention to non-technical, e.g., organizational issues. In this paper, we present both a clear position on namespace management in ICN and preliminary work on a potential solution. We conceptualize a namespace management system for hierarchical names and introduce a prototype for NDN, which leverages existing DNSSEC equipped DNS infrastructure. Based on this, we are able to implement both technical and non-technical aspects of namespace management. We consider lessons learned and pitfalls from decades of the ever-evolving development of domain name system. As the de facto standard namespace management for the Internet, it is an integral orientation factor for both our concept and its implementation.
Sicherheitsforschung im Dialog
Perspektiven der Sicherheitsforschung
Peter Lang D eBooks, Apr 9, 2012
Wireless and Mobile Communications
IGI Global eBooks, Jan 18, 2011
This chapter introduces different wireless and mobile communication systems that represent an imp... more This chapter introduces different wireless and mobile communication systems that represent an important technological basis for ubiquitous computing applications. Different communication systems co-exist and vary with respect to many parameters, such as transmission range, data rates, cost, mobility, power consumption, scalability in the number of users, and so forth. The introduction gives a quick chapter overview of prominent communication systems. Next, the necessary minimal knowledge required about wireless transmission and media-sharing technologies is provided. The core of the chapter then provides brief introductions to the classes of wireless networks that are most relevant for ubiquitous computing, in particular wireless wide area networks and wireless distribution, local area, personal area, and sensor networks. A brief description of current convergence efforts follows. Readers should be aware that the wealth of technologies to be considered requires this chapter to remain rather survey-like.
Sicherheit als symbolisches Gut
Peter Lang eBooks, Jul 11, 2016
Drahtlose Kommunikation: Grenzenlose Möglichkeiten auf Kosten der Sicherheit?
Peter Lang eBooks, Jul 11, 2016
Vorwort: Hartfrid Wolff, MdB (FDP), Dr. Konstantin von Notz, MdB (Bündnis 90/Die Grünen) Steuerungskreis Forschungsforum Öffentliche Sicherheit
Peter Lang eBooks, Jul 11, 2016
Ergebnisse interdisziplinärer Risiko- und Sicherheitsforschung
Die Printversion ist zu beziehen per Email über die Hochschulschriftenstelle der Universitätsbibl... more Die Printversion ist zu beziehen per Email über die Hochschulschriftenstelle der Universitätsbibliothek der FU Berlin (
CRC Press eBooks, Dec 15, 2012
Figure 20.1 Centralized data processing vs. decentralized event detection. 442 ■ Intelligent Sens... more Figure 20.1 Centralized data processing vs. decentralized event detection. 442 ■ Intelligent Sensor Networks Event detection allows for a wireless sensor network to reliably detect application-specific events based on data sampled from the environment. Events, in this context, may range from the comparatively easy to detect outbreak of a fire to the more complex stumbling and falling of a patient, or even to an intrusion into a restricted area. Distributed event detection leverages the data processing capability of the sensor nodes in order to locally extract semantically meaningful information from the sensed data. This process may involve one or multiple nodes in a given region of the deployment, and generally avoids data transmissions to the base station of the network. This in turn reduces the overall energy consumption and ultimately leads to a prolonged lifetime of the network. In this chapter, we motivate the need for in-network data processing and event detection, and briefly review the current state of the art. We then present in detail our own approach to distributed event detection and discuss hardware platform, software architecture, and algorithms and protocols used in the detection process. Our approach has been tested extensively in several real-world deployments and we give an overview of the results from these experiments. The results illustrate how distributed event detection can achieve both high accuracy and energy efficiency, and thus mark the advantages of this approach to data processing in sensor networks.
IEEE Transactions on Mobile Computing, Aug 1, 2019
As a step towards ubiquitous and mobile computing, a decentralized localization platform allows p... more As a step towards ubiquitous and mobile computing, a decentralized localization platform allows positioning for objects and persons. The decentralized computation of the position enables to shift the application-level knowledge into a Mobile Station (MS) and avoids the communication with a remote device such as a server. In addition, computing a position on resource-constrained devices is challenging due to the restricted storage, computing capacity and power supply. Therefore, we propose suitable algorithms to compute unoptimized as well as optimized positions on resource-limited MSs. Algorithms for unoptimized positions will be analyzed with respect to the stability, complexity, and memory requirements. The calculated positions are optimized by using the Gauss-Newton (GNM) or Levenberg-Marquardt methods (LVMs). We analyze and compare the GNM with two variants of the LVM algorithm. Furthermore, we develop an adaptive algorithm for the position optimization, which is based on the Singular Value Decomposition (SVD), LVM algorithm, and the Dilution of Precision. This method allows an adaptive selection mechanism for the LVM algorithm. The influence and choice of the right parameter combination of the LVM algorithm will be analyzed and discussed. Finally, we design and evaluate a method to reduce multipath errors on the MS.
Encyclopedia of Geography, Nov 17, 2014
Location Management (LM) has become a diverse and broad field for research, and Location Based Se... more Location Management (LM) has become a diverse and broad field for research, and Location Based Services (LBS) are the "Application Layer" of LM. Research areas for LM include LM in Wireless Networks, Ad-hoc networks, WiFi, 802.15, WiMax, and mostly; cellular networks. The integration of IP (especially IPv6) into LM is the hottest topic of today. This survey paper tends to introduce the reader to the latest research on LM in Wireless Data Networks and explore the various technologies under research and construction.
A Survey of current Approaches towards Specification and Management of Quality of Service for Web Services
PIK. Praxis der Informationsverarbeitung und Kommunikation, Sep 1, 2004
... 9, D-14195 Berlin, Germany {tian, gramm, hritter, schiller, winter}@inf.fu-berlin.de ... Veri... more ... 9, D-14195 Berlin, Germany {tian, gramm, hritter, schiller, winter}@inf.fu-berlin.de ... Verity: A QoS Metric for Selecting Web Services and Providers1st Web Services Quality Workshop (WQW 2003), in ... 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI'04), Sep. ...
Peter Lang eBooks, Jul 11, 2016
Risikowahrnehmung in der Bevölkerung-Implikationen für das Sicherheitsempfinden Ortwin Renn Zusam... more Risikowahrnehmung in der Bevölkerung-Implikationen für das Sicherheitsempfinden Ortwin Renn Zusammenfassung: Die Diskrepanz zwischen den statistisch errechneten Risiken und der intuitiven Risikowahrnehmung ist vor allem bei Risiken, die auf Sicherheit und Gesundheit einwirken, besonders hoch. Das liegt zum einen an der Komplexität der jeweils vorhandenen Ursache-Wirkungsketten, die oft kontra-intuitiv und wenig plausibel sind, zum anderen an psychologischen und sozialen Verarbeitungsmechanismen von Risikoinformationen. Der Artikel beschreibt diese Wahrnehmungprozesse in einem Ablaufschema von der Aufnahme von Signalen bis zu ihrer Umsetzung in mentale und auch verhaltensleitende Reaktionen. Das Ziel ist dabei, die Mechanismen zu verdeutlichen, die einer angemessenen und konsistenten Urteilsbildung entgegenstehen.
Freiheit und Innere Sicherheit?
Peter Lang eBooks, Jul 11, 2016
Wie viel Unsicherheit ertragen wir?
Peter Lang eBooks, Jul 11, 2016
Technik- und naturwissenschaftliche Perspektiven der Sicherheitsforschung
Peter Lang eBooks, Jul 11, 2016
Lars Gerhold, Marie-Luise Beck, Jochen Schiller: Zwischen Sicherheit und Unsicherheit: Herausforderungen eines interdisziplinären Diskursfeldes
Peter Lang eBooks, Jul 11, 2016