Since October 2020, I am working as research associate at Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) in the Cyber Analysis & Defense (CA&D) department, headed by Prof. Dr. Elmar Padilla. I graduated with an M.Sc. in Computer Science in May 2020 and received my B.Sc. in November 2017, both from RWTH Aachen University.
My research focuses on securing the industrial networks of the future. On the one hand, this research revolves around integrating security into networks that were not built with security in mind, without disrupting existing processes. On the other hand, my research revolves around how we can utilize recent security and cryptography research advances to innovate the (industrial) IoT.
M.Sc. in Computer Science, 2020
RWTH Aachen University
B.Sc. in Computer Science, 2017
RWTH Aachen University
Wireless communication in industrial networks is challenging due to low latency and high reliability requirements. In this paper, we propose a MAC layer based on distributed priority queues to take advantage of industrial networks’ heterogeneity and the fact that all industrial IoT devices within them pursue a common goal. Through several extensions, we increase the reliability of high-priority messages by several orders of magnitude without reducing less important messages’ reliability.
In this paper, we present SmartJudge, an extensible framework for secure and private trades of digital assets without a trusted third party. We designed efficient verifiers for ETH to BTC atomic swaps (by introducing a novel Bitcoin transaction verification algorithm) and fair data exchanges. In both cases, we achieve cheaper trades compared to the state-of-the-art and, additionally, provide contract confidentiality. SmartJudge optimistically assumes honest behavior by both parties and offers recovery mechanisms (paid for by the malicious actor) in case of misbehavior.
In this paper, we first survey latency requirements towards industrial Internet of Things (IIoT) devices. We then propose two optimization mechanisms for established AES-based encryption and authentication to help IIoT devices achieve their stringent latency requirements. These mechanisms work by enabling the preprocessing of cryptographic operations, yielding latency reductions of up to 75.9%.