Blockchains are one of the most interesting and relevant technologies that were created in recent years. Their initial purpose has been serving as a non-erasable and tamperproof ledger for decentralized payment systems. Besides this applicationo area, Blockchain technology can be used in other types of networked systems as a trusted building block comparable to a secure element in computer hardware.
For this reason, our first research focus are Trustworthy Networked Services based on Blockchain Technology. Furthremore, we perform Behavioral Analysis of Blockchains to better understand their network-related properties. Besides research, Blockchains play an important role in our courses.
Blockchain-Based Trustworthy Networked Services
The first focal point of our activities around Blockchains is our investigation how Blockchain technology can help us to build trustworthy and secure networked services. This includes research on federated identity management across different institutions, and secure and accountable configuration of networked devices.
Behavioral Analysis of Blockchains
Our chair has a long history in traffic measurement and analysis. For this reason, our second research focus on Blockchains is understanding their behavior in networks, and which effects Blockchains have on the network. Hence, we are currently building tools for our network test bed that allow us to conduct reproducible experiments with different Blockchain implementations in a controlled environment.
In our lecture on Peer-to-Peer Systems and Security (IN2194) there is currently a large chapter dedicated to this topic. Furthermore, we offer a Blockchain experiment in our lab course iLab2 (IN0012, IN2106, IN2257, IN4097, IN8018). Lastly, we offer topics on the subject in our seminars and pro seminar.
You find further information about our activities on our B²TNS interest group page on this topic.
|2020-04-01||Holger Kinkelin, Richard von Seck, Christoph Rudolf, Georg Carle, “Hardening X.509 Certificate Issuance using Distributed Ledger Technology,” in NOMS 2020 - IEEE/IFIP Workshop DISSECT 2020, Budapest, Hungary, Apr. 2020. [Preprint] [Bib]|
|2019-04-01||Holger Kinkelin, Heiko Niedermayer, Marc-Oliver Müller, Georg Carle, “Multi-party authorization and conflict mediation for decentralized configuration management processes,” in IM 2019 - IEEE/IFIP Workshop HotNSM 2019, Washington D.C., USA, Apr. 2019. [Preprint] [Bib]|
|2019-04-01||Cora Perner, Holger Kinkelin, Georg Carle, “Adaptive Network Management for Safety-Critical Systems,” in IM 2019 - IEEE/IFIP Workshop Dissect 2019, Washington D.C., USA, Apr. 2019. [Bib]|
|2018-12-01||Cornelius Diekmann, Johannes Naab, Andreas Korsten, Georg Carle, “Agile Network Access Control in the Container Age,” IEEE Transactions on Network and Service Management, Dec. 2018. [Pdf] [DOI] [Bib]|
|2018-12-01||Fabien Geyer, “DeepComNet: Performance Evaluation of Network Topologies using Graph-Based Deep Learning,” Performance Evaluation, Dec. 2018. [Pdf] [DOI] [Bib]|
|2018-10-01||Paul Emmerich, Maximilian Pudelko, Quirin Scheitle, Georg Carle, “Efficient Dynamic Flow Tracking for Packet Analyzers,” in CloudNet, Tokyo, Japan, Oct. 2018. [Pdf] [Bib]|
|2018-08-01||Fabien Geyer, Georg Carle, “Learning and Generating Distributed Routing Protocols Using Graph-Based Deep Learning,” in Proceedings of the 2018 SIGCOMM Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, Budapest, Hungary, Aug. 2018, pp. 40–45. [Pdf] [DOI] [Bib]|
|2018-03-01||Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, Georg Carle, “In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements,” in Proceedings of the Passive and Active Measurement Conference (PAM 2018), Best Paper Award, Berlin, Germany, Mar. 2018. [Url] [Pdf] [Slides] [Sourcecode] [Rawdata] [Blog] [Bib]|
|2018-03-01||Tobias Brunnwieser, Oliver Gasser, Sree Harsha Totakura, Georg Carle, “Live Detection and Analysis of HTTPS Interceptions,” in Passive and Active Measurement Conference (PAM), Poster, Berlin, Germany, Mar. 2018. [Pdf] [Poster] [Bib]|
|2017-12-01||Fabien Geyer, “Performance Evaluation of Network Topologies using Graph-Based Deep Learning,” in Proc. 11th EAI International Conference on Performance Evaluation Methodologies and Tools, Venice, Italy, Dec. 2017. [Pdf] [DOI] [Bib]|
|2019-01-01||Jan Martin Vogt, “Feasibility of DLT-based Data Storage and Exchange in Small Scale IoT Networks.” BA, 2019. Dr. Holger Kinkelin [Bib]|
|2018-01-01||Julian Roos, “Modelling Organizational Structues for a Federated Distributed Ledger-Based Certificate Management System.” BA, 2018. Dr. Holger Kinkelin [Pdf] [Bib]|
|2018-01-01||Yannick Gehring, “Incorporating Automated Checks in a Distributed Ledger-Based Certificate Issuance System.” BA, 2018. Dr. Heiko Niedermayer, Dr. Holger Kinkelin [Pdf] [Bib]|
|2018-01-01||Anil Karatas, “Experimental Performance Evaluation of Distributed Private Ledgers in a Virtualized Environment.” MA, 2018. Dr. Holger Kinkelin, Benedikt Jaeger [Pdf] [Bib]|
|2017-01-01||Jan Felix Hoops, “Federated Identity and Transaction Management over Blockchain II.” BA, 2017. Dr. Heiko Niedermayer, Dr. Holger Kinkelin [Pdf] [Bib]|
|2017-01-01||Stefanos Georgiou, “A Trustworthy Process-Tracing System for B2B-Applications based on Blockchain Technology.” MA, 2017. Dr. Holger Kinkelin, Sree Harsha Totakura, Dr. Heiko Niedermayer [Pdf] [Bib]|
|2017-01-01||Valentin Hauner, “Trustworthy Configuration Management with Distributed Ledgers.” MA, 2017. Dr. Holger Kinkelin, Dr. Heiko Niedermayer [Pdf] [Bib]|
|2017-01-01||Hendrik Leppelsack, “Experimental Performance Evaluation of Private Distributed Ledger Implementations.” MA, 2017. Dr. Holger Kinkelin, Stefan Liebald [Pdf] [Bib]|
|2017-01-01||Max Helm, “Traceable Measurement Result Publication in Append-only Ledgers.” MA, 2017. Oliver Gasser, Benjamin Hof, Quirin Scheitle [Pdf] [Bib]|