@misc{ruotsalainen_how_2018, address = {St. Pölten, Austria}, title = {How to secure {IoT} on the wireless physical layer}, url = {https://itsecx.fhstp.ac.at/content/download/166239/file/04_Henri-Ruotsalainen_FH-St.-P%C3%B6lten.pdf}, author = {Ruotsalainen, Henri}, month = nov, year = {2018}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Publikationstyp Präsentation, Vortrag, Wiss. Beitrag}, } @inproceedings{hodo_anomaly_2017, title = {Anomaly {Detection} for {Simulated} {IEC}-60870-5-104 {Trafiic}}, doi = {10/gh372t}, publisher = {ACM}, author = {Hodo, Ersi and Grebeniuk, Stepan and Ruotsalainen, Henri and Tavolato, Paul}, year = {2017}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Publikationstyp Schriftpublikation, SP IT Sec Applied Security \& Data Science, Vortrag, peer-reviewed}, } @inproceedings{ruotsalainen_towards_2018, address = {Hamburg, Deutschland}, title = {Towards {Wireless} {Secret} key {Agreement} with {LoRa} {Physical} {Layer}}, doi = {10/gh3732}, booktitle = {Proceedings of the 13th {International} {Conference} on {Availability}, {Reliability} and {Security}}, publisher = {ACM}, author = {Ruotsalainen, Henri and Grebeniuk, Stepan}, year = {2018}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Publikationstyp Schriftpublikation, Vortrag, peer-reviewed}, } @article{ruotsalainen_experimental_2019, title = {Experimental {Investigation} on {Wireless} {Key} {Generation} for {Low} {Power} {Wide} {Area} {Networks}}, doi = {10/ggxwns}, abstract = {The wireless key generation is a potential way to implement information theoretically secure key refreshment for IoT devices. The state-of-the-art work on key generation mainly utilizes the wireless local area network technologies. However, they have not sufficiently considered the typical characteristics of low power wide area network (LPWAN) such as lengthy payloads, duty cycled transmission and reception, or limitations for channel utilization. In this paper, we carried out a comprehensive experimental investigation on key generation applied with LPWAN, taking LoRa/LoRaWAN as case studies. A key generation protocol optimized for typical LPWAN applications is proposed. According to the extensive evaluations with deep in-building and long distance (up to 7 km) outdoor LoRaWAN links, extraction of keys with high randomness becomes feasible. Moreover, we study the achievable AES128 key refreshment periods for different eavesdropper key disagreement rates. As indicated by our measurement based evaluations, the AES128 key can be renewed every three hours with the proposed key generation protocol and with the maximum LoRaWAN spreading factor setting (longest range). A further interesting evaluation result demonstrates that a secure key refreshment is still possible even when the eavesdropper key disagreement rate is very close to the rate of the legitimate users.}, journal = {IEEE Internet of Things Journal}, author = {Ruotsalainen, Henri and Zhang, Junqing and Grebeniuk, Stepan}, month = nov, year = {2019}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec System \& Application Security, best, best haruotsa, peer-reviewed}, } @article{leder_hierarchical-table-based_2016, title = {Hierarchical-{Table}-{Based} {Model} for {All}-{Digital} {RF} {Transmitters}}, doi = {10/f9t8nr}, number = {99}, journal = {IEEE Transactions on Microwave Theory and Techniques}, author = {Leder, Norbert and Pichler, Bernhard and Faseth, Thomas and Ruotsalainen, Henri and Arthaber, Holger}, year = {2016}, note = {Projekt: LoRaKey}, keywords = {Department Technologie, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Publikationstyp Schriftpublikation, peer-reviewed}, } @misc{ruotsalainen_identifying_2017, address = {St. Pölten, Austria}, title = {Identifying {Attacks} in {Electrical} {Sub}-{Station} {Networks}}, url = {https://itsecx.fhstp.ac.at/wp-content/uploads/2017/11/03_Routsalainen_ITSecx2017.pdf}, author = {Ruotsalainen, Henri}, month = oct, year = {2017}, keywords = {Department Technologie, FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, Publikationstyp Präsentation, Vortrag, Wiss. Beitrag}, }