{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:25:08Z","timestamp":1730323508760,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390621612"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,28]]},"DOI":"10.1145\/3445969.3450423","type":"proceedings-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T09:56:30Z","timestamp":1619344590000},"page":"78-87","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Transparent End-to-End Security for Publish\/Subscribe Communication in Cyber-Physical Systems"],"prefix":"10.1145","author":[{"given":"Markus","family":"Dahlmanns","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Ina Berenice","family":"Fink","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Bernd","family":"Schoolmann","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423349"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_2_3_1","unstructured":"Andrew Banks and Rahul Gupta. 2014. MQTT Version 3.1.1. OASIS Standard. Andrew Banks and Rahul Gupta. 2014. MQTT Version 3.1.1. OASIS Standard."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2019.8795309"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.013"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423666"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501684"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927078"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks and Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246. https:\/\/doi.org\/10.17487\/RFC5246 Tim Dierks and Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246. https:\/\/doi.org\/10.17487\/RFC5246","DOI":"10.17487\/rfc5246"},{"volume-title":"Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime '20)","author":"Dodson Michael","key":"e_1_3_2_2_10_1","unstructured":"Michael Dodson , Alastair R. Beresford , and Daniel R. Thomas . 2020. When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices . In Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime '20) . IEEE. Michael Dodson, Alastair R. Beresford, and Daniel R. Thomas. 2020. When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices. In Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime '20). IEEE."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"e_1_3_2_2_12_1","unstructured":"Eclipse Foundation. 2010. Eclipse Mosquitto. https:\/\/mosquitto.org\/. Eclipse Foundation. 2010. Eclipse Mosquitto. https:\/\/mosquitto.org\/."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Pasi Eronen and Hannes Tschofenig. 2005. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). IETF RFC 4279. https:\/\/doi.org\/10.17487\/RFC4279 Pasi Eronen and Hannes Tschofenig. 2005. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). IETF RFC 4279. https:\/\/doi.org\/10.17487\/RFC4279","DOI":"10.17487\/rfc4279"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.698"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/67.222741"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.871"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2966402"},{"key":"e_1_3_2_2_19_1","unstructured":"Robert Godfrey David Ingham and Rafael Schloming. 2014. OASIS Advanced Message Queuing Protocol (AMQP) Version 1.0. OASIS Standard. Robert Godfrey David Ingham and Rafael Schloming. 2014. OASIS Advanced Message Queuing Protocol (AMQP) Version 1.0. OASIS Standard."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975142"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162199"},{"key":"e_1_3_2_2_22_1","first-page":"3000336","article-title":"Complying with Data Handling Requirements in Cloud Storage Systems","volume":"2020","author":"Henze Martin","year":"2020","unstructured":"Martin Henze , Roman Matzutt , Jens Hiller , Erik M\u00fchmer et al. 2020 . Complying with Data Handling Requirements in Cloud Storage Systems . IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC. 2020 . 3000336 Martin Henze, Roman Matzutt, Jens Hiller, Erik M\u00fchmer et al. 2020. Complying with Data Handling Requirements in Cloud Storage Systems. IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC.2020.3000336","journal-title":"IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.236"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733571"},{"key":"e_1_3_2_2_25_1","unstructured":"International Electrotechnical Commission. 2014. Industrial communication networks - Fieldbus specifications. IEC 61158. International Electrotechnical Commission. 2014. Industrial communication networks - Fieldbus specifications. IEC 61158."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00051"},{"key":"e_1_3_2_2_27_1","volume-title":"Wireless sensor\/actuator device configuration by NFC with secure key exchange. In 2017 IEEE AFRICON","author":"Klauer Bernd","year":"2017","unstructured":"Bernd Klauer , Jan Haase , Dominik Meyer , and Marcel Eckert . 2017. Wireless sensor\/actuator device configuration by NFC with secure key exchange. In 2017 IEEE AFRICON . IEEE , 473--478. https:\/\/doi.org\/10.1109\/AFRCON. 2017 .8095528 Bernd Klauer, Jan Haase, Dominik Meyer, and Marcel Eckert. 2017. Wireless sensor\/actuator device configuration by NFC with secure key exchange. In 2017 IEEE AFRICON. IEEE, 473--478. https:\/\/doi.org\/10.1109\/AFRCON.2017.8095528"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk and Pasi Eronen. 2010. HMAC-based Extract-and-Expand Key Derivation Function (HKDF). IETF RFC 5869. https:\/\/doi.org\/10.17487\/RFC5869 Hugo Krawczyk and Pasi Eronen. 2010. HMAC-based Extract-and-Expand Key Derivation Function (HKDF). IETF RFC 5869. https:\/\/doi.org\/10.17487\/RFC5869","DOI":"10.17487\/rfc5869"},{"volume-title":"Proceedings of the 28th USENIX Security Symposium (SEC '19)","author":"Kumar Sam","key":"e_1_3_2_2_29_1","unstructured":"Sam Kumar , Yuncong Hu , Michael P. Andersen , Raluca Ada Popa , and David E. Culler . 2019. JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT . In Proceedings of the 28th USENIX Security Symposium (SEC '19) . USENIX Association, 1519--1536. Sam Kumar, Yuncong Hu, Michael P. Andersen, Raluca Ada Popa, and David E. Culler. 2019. JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. In Proceedings of the 28th USENIX Security Symposium (SEC '19). USENIX Association, 1519--1536."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-014-0334-4"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340503"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523562"},{"key":"e_1_3_2_2_35_1","unstructured":"Modbus-IDA. 2006. MODBUS Application Protocol Specification V1.1b . Modbus-IDA. 2006. MODBUS Application Protocol Specification V1.1b ."},{"key":"e_1_3_2_2_36_1","unstructured":"Hirotaka Niisato. 2014. MQTT for Photon Spark Core. https:\/\/github.com\/hirotakaster\/MQTT . Hirotaka Niisato. 2014. MQTT for Photon Spark Core. https:\/\/github.com\/hirotakaster\/MQTT ."},{"key":"e_1_3_2_2_37_1","unstructured":"OPC Foundation. 2017. OPC Unified Architecture -- Part 14: PubSub. OPC 10000--14: OPC Unified Architecture. OPC Foundation. 2017. OPC Unified Architecture -- Part 14: PubSub. OPC 10000--14: OPC Unified Architecture."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44892-6_3"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGRID.2006.311018"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.15439\/2015F322"},{"volume-title":"Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC '20)","author":"Pennekamp Jan","key":"e_1_3_2_2_41_1","unstructured":"Jan Pennekamp , Erik Buchholz , Yannik Lockner , Markus Dahlmanns et al. 2020 a. Privacy-Preserving Production Process Parameter Exchange . In Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC '20) . ACM, 510--525. https:\/\/doi.org\/10.1145\/3427228.3427248 Jan Pennekamp, Erik Buchholz, Yannik Lockner, Markus Dahlmanns et al. 2020 a. Privacy-Preserving Production Process Parameter Exchange. In Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC '20). ACM, 510--525. https:\/\/doi.org\/10.1145\/3427228.3427248"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS '19)","author":"Pennekamp Jan","year":"2019","unstructured":"Jan Pennekamp , Ren\u00e9 Glebke , Martin Henze , Tobias Meisen et al. 2019 a. Towards an Infrastructure Enabling the Internet of Production . In Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS '19) . IEEE, 31--37. https:\/\/doi.org\/10.1109\/ICPHYS. 2019 .8780276 Jan Pennekamp, Ren\u00e9 Glebke, Martin Henze, Tobias Meisen et al. 2019 a. Towards an Infrastructure Enabling the Internet of Production. In Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS '19). IEEE, 31--37. https:\/\/doi.org\/10.1109\/ICPHYS.2019.8780276"},{"volume-title":"Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19)","author":"Pennekamp Jan","key":"e_1_3_2_2_43_1","unstructured":"Jan Pennekamp , Martin Henze , Simo Schmidt , Philipp Niemietz et al. 2019 b. Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective . In Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19) . ACM, 27--38. https:\/\/doi.org\/10.1145\/3338499.3357357 Jan Pennekamp, Martin Henze, Simo Schmidt, Philipp Niemietz et al. 2019 b. Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective. In Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19). ACM, 27--38. https:\/\/doi.org\/10.1145\/3338499.3357357"},{"volume-title":"Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20)","author":"Pennekamp Jan","key":"e_1_3_2_2_44_1","unstructured":"Jan Pennekamp , Patrick Sapel , Ina Berenice Fink , Simon Wagner et al. 2020 b. Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking . In Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20) . Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner et al. 2020 b. Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking. In Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20) ."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla and Nagendra Modadugu. 2012. Datagram Transport Layer Security Version 1.2. IETF RFC 6347. https:\/\/doi.org\/10.17487\/RFC6347 Eric Rescorla and Nagendra Modadugu. 2012. Datagram Transport Layer Security Version 1.2. IETF RFC 6347. https:\/\/doi.org\/10.17487\/RFC6347","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_2_49_1","first-page":"332","article-title":"MQT-TZ: Secure MQTT Broker for Biomedical Signal Processing on the Edge","volume":"270","author":"Segarra Carlos","year":"2020","unstructured":"Carlos Segarra , Ricard Delgado-Gonzalo , and Valerio Schiavoni . 2020 . MQT-TZ: Secure MQTT Broker for Biomedical Signal Processing on the Edge . Studies in Health Technology and Informatics , Vol. 270 , 332 -- 336 . https:\/\/doi.org\/10.3233\/SHTI200177 Proceedings of 2020 Medical Informatics Europe on Digital Personalized Health and Medicine (MIE '20). Carlos Segarra, Ricard Delgado-Gonzalo, and Valerio Schiavoni. 2020. MQT-TZ: Secure MQTT Broker for Biomedical Signal Processing on the Edge. Studies in Health Technology and Informatics, Vol. 270, 332--336. https:\/\/doi.org\/10.3233\/SHTI200177 Proceedings of 2020 Medical Informatics Europe on Digital Personalized Health and Medicine (MIE '20).","journal-title":"Studies in Health Technology and Informatics"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2015.16"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.008"},{"key":"e_1_3_2_2_52_1","unstructured":"Rhys Weatherley. 2012. Arduino Cryptography Library. https:\/\/github.com\/rweather\/arduinolibs . Rhys Weatherley. 2012. Arduino Cryptography Library. https:\/\/github.com\/rweather\/arduinolibs ."},{"key":"e_1_3_2_2_53_1","volume-title":"Mattord","author":"Whitman Michael E.","year":"2011","unstructured":"Michael E. Whitman and Herbert J . Mattord . 2011 . Principles of Information Security 4th ed.). Course Technology Press . Michael E. Whitman and Herbert J. Mattord. 2011. Principles of Information Security 4th ed.). Course Technology Press."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445969.3450423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T08:46:45Z","timestamp":1673081205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445969.3450423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":52,"alternative-id":["10.1145\/3445969.3450423","10.1145\/3445969"],"URL":"https:\/\/doi.org\/10.1145\/3445969.3450423","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}