TY - JOUR A1 - Grum, Marcus A1 - Bender, Benedict A1 - Alfa, A. S. A1 - Gronau, Norbert T1 - A decision maxim for efficient task realization within analytical network infrastructures JF - Decision support systems : DSS ; the international journal N2 - Faced with the increasing needs of companies, optimal dimensioning of IT hardware is becoming challenging for decision makers. In terms of analytical infrastructures, a highly evolutionary environment causes volatile, time dependent workloads in its components, and intelligent, flexible task distribution between local systems and cloud services is attractive. With the aim of developing a flexible and efficient design for analytical infrastructures, this paper proposes a flexible architecture model, which allocates tasks following a machine-specific decision heuristic. A simulation benchmarks this system with existing strategies and identifies the new decision maxim as superior in a first scenario-based simulation. KW - Analytics KW - Architecture concepts KW - Cyber-physical systems KW - Internet of things KW - Task realization strategies KW - Simulation Y1 - 2018 U6 - https://doi.org/10.1016/j.dss.2018.06.005 SN - 0167-9236 SN - 1873-5797 VL - 112 SP - 48 EP - 59 PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Krentz, Konrad-Felix A1 - Meinel, Christoph T1 - Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL) JF - Computer Networks N2 - Coordinated sampled listening (CSL) is a standardized medium access control protocol for IEEE 80215.4 networks. Unfortunately, CSL comes without any protection against so-called denial-of-sleep attacks. Such attacks deprive energy-constrained devices of entering low-power sleep modes, thereby draining their charge. Repercussions of denial-of-sleep attacks include long outages, violated quality-of-service guarantees, and reduced customer satisfaction. However, while CSL has no built-in denial-of-sleep defenses, there already exist denial-of-sleep defenses for a predecessor of CSL, namely ContikiMAC. In this paper, we make two main contributions. First, motivated by the fact that CSL has many advantages over ContikiMAC, we tailor the existing denial-of-sleep defenses for ContikiMAC to CSL. Second, we propose several security enhancements to these existing denial-of-sleep defenses. In effect, our denial-of-sleep defenses for CSL mitigate denial-of-sleep attacks significantly better, as well as protect against a larger range of denial-of-sleep attacks than the existing denial-of-sleep defenses for ContikiMAC. We show the soundness of our denial-of-sleep defenses for CSL both analytically, as well as empirically using a whole new implementation of CSL. (C) 2018 Elsevier B.V. All rights reserved. KW - Internet of things KW - Link layer security KW - MAC security KW - Denial of sleep Y1 - 2018 U6 - https://doi.org/10.1016/j.comnet.2018.10.021 SN - 1389-1286 SN - 1872-7069 VL - 148 SP - 60 EP - 71 PB - Elsevier CY - Amsterdam ER -