Skip Navigation

Barkhausen Institut

Trustworthy​ Data Processing

What we do

The main objective of the group Trustworthy​ Data Processing is the development of a platform which enables secure and privacy-respecting data processing for IoT applications. Therefore, we will develop building blocks which can be easily combined to build an integrated solution. Thereby we will take an holistic view which – besides pure technical aspects – covers economic, legal and organizational means.  

The main strategy to achieve our goal is the decomposition of the overall system into security-critical and non-security-critical components. Thereby the foundation of our work are the results achieved by the Composability HW/SW research whilst our group will contribute to enhance the state-of-the-art regarding this Key Principle. We will develop new methods and protocols for key exchange considering the very heterogeneous domain of IoT. Here we will integrate the results of Physical Layer Security into an overall security concept. Additionally, our group will work on new methods for secure updates allowing to keep especially the security-critical components up to date over the whole lifetime of IoT devices. 

We will develop new concepts to better balance the tradeoff regarding privacy vs. utility supporting privacy-respecting data processing without losing functionality. We will pay special attention to new privacy-related protection goals like transparency and intervenability.  

Who we are

Stefan Köpsell
Dr.-Ing.Stefan KöpsellResearch Group Leader
Maryam Zarezadeh
PhDMaryam ZarezadehSenior Researcher
Yevhen Zolotavkin
PhDYevhen ZolotavkinSenior Researcher
Tianxiang Dai
Dr.-Ing.Tianxiang DaiASSOCIATE RESEARCHER
Prajnamaya Dass
PhDPrajnamaya DassAssociate Researcher
Jana Eisoldt
M.Sc.Jana EisoldtAssociate Researcher
Moritz Jasper
Dipl. Ing.Moritz JasperAssociate Researcher
Ali Khandan Boroujeni
M.Sc.Ali Khandan BoroujeniAssociate Researcher
Mahshid Mehrabi
Dr.-Ing.Mahshid MehrabiAssociate Researcher
Richard Riedel
M. Sc.Richard RiedelAssociate Researcher

Publications

Mahshid Mehrabi, Ali Khandan Boroujeni, Vincent Latzko, Stefan Köpsell, Towards Deploying Secure and highly available O-RAN components, Proceedings 2024 IEEE Future Networks World Forum (FNWF), 2024

@inproceedings{
deplyoment_o_ran2024,
title = "Towards Deploying Secure and highly available O-RAN components",
author = "Mahshid Mehrabi, Ali Khandan Boroujeni, Vincent Latzko, Stefan Köpsell",
year = "2024",
booktitle = "Proceedings 2024 IEEE Future Networks World Forum (FNWF)"
}
Download BibTex

Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten, Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal, 4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024), 2024

@inproceedings{
RoPa_2024,
title = "Enabling Mobility-Oriented JCAS in 6G Networks: An Architecture Proposal",
author = "Philipp Rosemann, Sanket Partani, Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten",
year = "2024",
booktitle = "4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024)",
author_text = "Marc Miranda, Jannik Mähn, Michael Karrenbauer, William Meli, Rodrigo Hernangomez, Maximilian Lübke, Jacob Kochems, Stefan Köpsell, Anosch Aziz-Koch, Julia Beuster, Oliver Blume, Norman Franchi, Reiner Thomä, Slawomir Stanczak, Hans D. Schotten"
}
Download BibTex

Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell, Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security, Global Information Infrastructure and Networking Symposium (GIIS'24), 2024

@inproceedings{
BaBoK_2024,
title = "Machine Learning-Based Vector Quantization for Secret Key Generation in Physical Layer Security",
author = "Ghazal Bagheri, Ali Khandan Boroujeni, Stefan Köpsell",
year = "2024",
booktitle = "Global Information Infrastructure and Networking Symposium (GIIS'24)"
}
Download BibTex

Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell, Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach, 4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024), 2024

@inproceedings{
BoBaK_2024,
title = "Enhancing Frequency Hopping Security in ISAC Systems: A Physical Layer Security Approach",
author = "Ali Khandan Boroujeni, Ghazal Bagheri, Stefan Köpsell",
year = "2024",
booktitle = "4th IEEE International Symposium on Joint Communications & Sensing (JC&S 2024)"
}
Download BibTex

Mohammad Nosouhi, Syed Wajid Ali Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss, Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism, IEEE Transactions on Information Forensics and Security, 2023

@article{
NoSh_2023,
title = "Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism",
author = "Mohammad Nosouhi, Syed Wajid Ali Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss",
year = "2023",
journal = "IEEE Transactions on Information Forensics and Security",
volume = "18",
pages = "2160-2174"
}
Download BibTex

Jongkil Jeong, Yevhen Zolotavkin, Robin Doss, Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis, ACM Computing Surveys, ACM Computing Surveys, 2023

@article{
JeZoD_2023,
title = "Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis",
author = "Jongkil Jeong, Yevhen Zolotavkin, Robin Doss",
year = "2023",
journal = "ACM Computing Surveys",
booktitle = "ACM Computing Surveys",
month = "January",
number = "1",
volume = "55"
}
Download BibTex

Moritz Jasper, Stefan Köpsell, Secure and Dynamic Publish/Subscribe: LCMsec, 98th IEEE Vehicular Technology Conference, VTC Fall 2023, 2023

@inproceedings{
JaKö_2023,
title = "Secure and Dynamic Publish/Subscribe: LCMsec",
author = "Moritz Jasper, Stefan Köpsell",
year = "2023",
booktitle = "98th IEEE Vehicular Technology Conference, VTC Fall 2023"
}
Download BibTex

Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell, Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation, 9th International Conference on Information Systems Security and Privacy (ICISSP'23), 2023

@inproceedings{
ZoBa_2024,
title = "Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation",
author = "Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell",
year = "2023",
booktitle = "9th International Conference on Information Systems Security and Privacy (ICISSP'23)"
}
Download BibTex

Geoffroy Couteau, Maryam Zarezadeh, Non-interactive Secure Computation of Inner-Product from LPN and LWE, Advances in Cryptology – ASIACRYPT 2022, 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022

@inproceedings{
CoZa_2022,
title = "Non-interactive Secure Computation of Inner-Product from LPN and LWE",
author = "Geoffroy Couteau, Maryam Zarezadeh",
year = "2022",
booktitle = "Advances in Cryptology – ASIACRYPT 2022, 28th International Conference on the Theory and Application of Cryptology and Information Security"
}
Download BibTex

Sebastian Haas, Mattis Hasler, Friedrich Pauls, Stefan Köpsell, Nils Asmussen, Michael Roitzsch, Gerhard Fettweis, Trustworthy Computing for O-RAN: Security in a Latency-Sensitive Environment, 2nd Workshop On Architectural Evolution Toward 6G Networks - 6GARCH, 2022 , Download PDF

@inproceedings{
m3oran-haas,
title = "Trustworthy Computing for O-RAN: Security in a Latency-Sensitive Environment",
author = "Sebastian Haas, Mattis Hasler, Friedrich Pauls, Stefan Köpsell, Nils Asmussen, Michael Roitzsch, Gerhard Fettweis",
year = "2022",
booktitle = "2nd Workshop On Architectural Evolution Toward 6G Networks - 6GARCH",
month = "December",
pages = "1-6"
}
Download BibTex

Friedrich Pauls, Sebastian Haas, Stefan Köpsell, Michael Roitzsch, Nils Asmussen, Gerhard Fettweis, On Trustworthy Scalable Hardware/Software Platform Design, Smart Systems Integration Conference and Exhibition (SSI), 2022 , Download PDF

@inproceedings{
hwswplatform_pauls2022,
title = "On Trustworthy Scalable Hardware/Software Platform Design",
author = "Friedrich Pauls, Sebastian Haas, Stefan Köpsell, Michael Roitzsch, Nils Asmussen, Gerhard Fettweis",
year = "2022",
booktitle = "Smart Systems Integration Conference and Exhibition (SSI)",
month = "April"
}
Download BibTex

Holger Boche, Rafael Schaefer, Vincent Poor, Gerhard Fettweis, Trustworthiness Verification and Integrity Testing for Wireless Communication Systems, Proceedings of 2022 IEEE International Conference on Communications (ICC 2022), 2022

@conference{
Fettweis_ICC_2022,
title = "Trustworthiness Verification and Integrity Testing for Wireless Communication Systems",
author = "Holger Boche, Rafael Schaefer, Vincent Poor, Gerhard Fettweis",
year = "2022",
booktitle = "Proceedings of 2022 IEEE International Conference on Communications (ICC 2022)"
}
Download BibTex

Stephan Escher, Markus Sontowski, Stefan Köpsell, How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme, Proceedings VTC2021-Spring, 2021

@inproceedings{
EsKS_2021,
title = "How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme",
author = "Stephan Escher, Markus Sontowski, Stefan Köpsell",
year = "2021",
booktitle = "Proceedings VTC2021-Spring"
}
Download BibTex

Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig, Enabling and Optimizing MACsec for Industrial Environments, IEEE Transactions on Industrial Informatics, 2020

@article{
LaGa_2020,
title = "Enabling and Optimizing MACsec for Industrial Environments",
author = "Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig",
year = "2020",
journal = "IEEE Transactions on Industrial Informatics",
doi = "10.1109/TII.2020.3040966",
url = "https://ieeexplore.ieee.org/abstract/document/9272319"
}
Download BibTex

Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig, Enabling and Optimizing MACsec for Industrial Environments, Proc. 16th IEEE International Conference on Factory Communication Systems (WFCS), 2020

@inproceedings{
LaGH_2020,
title = "Enabling and Optimizing MACsec for Industrial Environments",
author = "Tim Lackorzynski, Gregor Garten, Jan Sönke Huster, Stefan Köpsell, Hermann Härtig",
year = "2020",
booktitle = "Proc. 16th IEEE International Conference on Factory Communication Systems (WFCS)",
publisher = "IEEE",
pages = "1--4",
doi = "10.1109/WFCS47810.2020.9114434",
url = "https://doi.org/10.1109/WFCS47810.2020.9114434"
}
Download BibTex

Marco Zoli, André Barreto, Stefan Köpsell, Padmanava Sen, Gerhard Fettweis, Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation, EURASIP Journal on Wireless Communications and Networking, 2020 , Download PDF

@article{
Zoli_2020_JWCN,
title = "Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation",
author = "Marco Zoli, André Barreto, Stefan Köpsell, Padmanava Sen, Gerhard Fettweis",
year = "2020",
journal = "EURASIP Journal on Wireless Communications and Networking",
month = "June",
number = "114",
pages = "24",
url = "https://doi.org/10.1186/s13638-020-01712-6",
doi = "10.1186/s13638-020-01712-6"
}
Download BibTex