@misc{13068,
  author       = {{Trsek, Henning and Lohweg, Volker}},
  pages        = {{228}},
  publisher    = {{Technische Hochschule Ostwestfalen-Lippe}},
  title        = {{{Institut für industrielle Informationstechnik / Institute Industrial IT : Jahresbericht 2023 - 2024}}},
  doi          = {{10.25644/5pc4-kb09}},
  volume       = {{2023/2024}},
  year         = {{2025}},
}

@misc{12831,
  abstract     = {{The overall Industry 4.0 developments and the highly dynamic threat landscape enhance the need for continuous security engineering of industrial components, modules, and systems. Security risk assessments play a major role to ensure a secure operation of Industrial Automation and Control Systems (IACSs) but are mostly neglected due to missing resources and a lack of human experts for the sophisticated manual tasks. Therefore, a method for information and process modelling regarding the automation of security risk assessments has been previously designed, but not yet evaluated. This work in progress begins the evaluation of the automated security risk assessment concept by investigating the related work and identifying the main deficits. The results include a requirements analysis for the verification and an outlook towards future evaluation aspects.}},
  author       = {{Ehrlich, Marco and Lukas, Georg and Trsek, Henning and Jasperneite, Jürgen and Kastner, Wolfgang and Diedrich, Christian}},
  booktitle    = {{2024 IEEE 20th International Conference on Factory Communication Systems (WFCS)}},
  isbn         = {{979-8-3503-1935-4}},
  issn         = {{2835-8511}},
  keywords     = {{Industry 4.0, Security, Risk Assessment, Automation, Requirements, Evaluation, Verification}},
  location     = {{Toulouse, FRANCE}},
  pages        = {{180--183}},
  publisher    = {{IEEE}},
  title        = {{{Requirements Analysis for the Evaluation of Automated Security Risk Assessments}}},
  doi          = {{10.1109/wfcs60972.2024.10540830}},
  year         = {{2024}},
}

@misc{11158,
  abstract     = {{Due to Industry 4.0 developments, the demanded modularity of manufacturing systems generates additional manual efforts for security experts to guarantee a secure operation. The rising utilization of information and the frequent changes of systems necessitate continuous security engineering. Therefore, this work in progress presents the specification and prototypical implementation for automated security risk assessments. In addition, an outlook towards the associated validation, verification, evaluation, and hypothesis testing is given.}},
  author       = {{Ehrlich, Marco and Bröring, Andre and Trsek, Henning and Jasperneite, Jürgen and Diedrich, Christian}},
  booktitle    = {{2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{979-8-3503-3992-5}},
  location     = {{ Sinaia, Romania }},
  publisher    = {{IEEE}},
  title        = {{{Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments}}},
  doi          = {{10.1109/etfa54631.2023.10275455}},
  year         = {{2023}},
}

@misc{12706,
  abstract     = {{Vaseline, also referred to as petrolatum, is a colloidal dispersion of liquid-crystalline structures of hydrocarbons derived from petroleum. It has long been recognized for its versatile applications in the pharmaceutical industry, with its use in the formulation of various topical medications, wound care products, and drug delivery systems. For pharmaceutical use, petrolatum has to meet the quality standards described in its Pharmacopoeia monograph. The comprised test ranges allow for a broad range of Vaseline qualities on the market, while the tests themselves only poorly discriminate between grades. The only differentiating properties are related to the melting behavior, which is tested via drop point analysis, and the consistency, addressed in the functionality-related characteristics section. In this study, we propose the hypothesis that Near-infrared spectroscopy (NIRS) could be a comparably simple method to evaluate the crystalline behavior of Vaseline qualities. We expect such information to provide additional details for Vaseline quality discrimination. This discrimination would allow the most suitable petroleum jelly to be selected for an existing formulation when the previous one needs to be replaced; for example, due to a manufacturer change. We demonstrate that NIRS in transmission and reflectance mode obtained by traditional continuous spectra acquisition and fragmented NIR spectra acquisition through multi-optical, multi-modal excitation, respectively, can both serve as a basis for detecting Vaseline quality differences, which we have further proven by thermal analysis and tests with semisolid formulations. Additionally, we demonstrate that a lower-cost multi-optical spectrometer in reflectance mode can detect Vaseline quality differences in rotated samples.}},
  author       = {{Fliedner, Niels Hendrik and Lohweg, Volker and Al-Karawi, Claudia and Pein-Hackelbusch, Miriam}},
  booktitle    = {{2023 IEEE 21st International Conference on Industrial Informatics (INDIN)}},
  editor       = {{Dörksen, Helene and Scanzio, Stefano  and Jasperneite, Jürgen and Wisniewski, Lukasz and Man, Kim Fung  and Sauter, Thilo  and Seno, Lucia  and Trsek, Henning and Vyatkin, Valeriy }},
  isbn         = {{978-1-6654-9314-7}},
  keywords     = {{multimodal sensing, crystalline materials, microstructure, rotation measurement, PCA, calorimetry, pharmaceuticals, European Pharmacopoeia}},
  location     = {{Lemgo}},
  publisher    = {{IEEE}},
  title        = {{{A Novel Spectroscopic Approach for Vaseline Quality Discrimination}}},
  doi          = {{10.1109/indin51400.2023.10218318}},
  year         = {{2023}},
}

@misc{12995,
  abstract     = {{Due to Industry 4.0 developments, the demanded modularity of manufacturing systems generates additional manual efforts for security experts to guarantee a secure operation. The rising utilization of information and the frequent changes of system structures necessitate a continuous and automated security engineering, especially by application of the mandatory security risk assessments. Collecting the required information for these assessments and formalising expert knowledge shall improve the security of modular manufacturing systems in the future. In order to automate the security risk assessment process, this work proposes a method to determine the Target Security Level (SL-T) in conformance to the IEC 62443 standard based on the MITRE ATT&CK framework and the Intel Threat Agent Library (TAL).}},
  author       = {{Ehrlich, Marco and Bröring, Andre and Diedrich, Christian and Jasperneite, Jürgen and Kastner, Wolfgang and Trsek, Henning}},
  booktitle    = {{2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany}},
  editor       = {{Jasperneite, Jürgen}},
  isbn         = {{978-1-6654-9314-7}},
  keywords     = {{Integrated circuits, Industries, Libraries, Security, Risk management, IEC Standards, Interviews}},
  location     = {{Lemgo}},
  publisher    = {{IEEE}},
  title        = {{{Determining the Target Security Level for Automated Security Risk Assessments}}},
  doi          = {{10.1109/indin51400.2023.10217902}},
  year         = {{2023}},
}

@inproceedings{11165,
  abstract     = {{The reduction of CO2 emissions caused by auto-mobile traffic relies on the development of electric mobility infrastructure which in turn relies on efficient communication between charge points, used to connect electric vehicles to the power network, and central systems, used to manage users and transactions. The Open Charge Point Protocol (OCPP) is an open communication protocol designed to connect charge points to a central system. An important aspect of the communication between these entities is the security of the connection. It is conceivable, for instance, that an adversary could compromise a central system to attack charge points.This work devises three different attack scenarios which could be executed by a malicious OCPP central system to attack an OCPP charge point. It also assesses the feasibility and potential consequences of such attacks. Additionally, it presents an approach of an "evil" OCPP server implementation, based on the SteVe server which was originally developed at the RWTH Aachen. The "evil" OCPP server implements various attack scenarios and is intended to be used for penetration testing of OCPP charge points that connect to the central system via WebSockets/JSON or SOAP/XML.}},
  author       = {{Gebauer, Lisa Helene and Trsek, Henning and Lukas, Georg}},
  booktitle    = {{2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{9781665499965}},
  location     = {{Stuttgart}},
  publisher    = {{IEEE}},
  title        = {{{Evil SteVe: An Approach to Simplify Penetration Testing of OCPP Charge Points}}},
  doi          = {{10.1109/ETFA52439.2022.9921430}},
  year         = {{2022}},
}

@inproceedings{11166,
  abstract     = {{n order to utilize the full potential of an assembly assistant, it is necessary for the system to be able to adapt to the worker’s individual needs and capabilities. The required amount of necessary assistance changes during the assembly work because the worker memorizes the steps and learns the task and might be bothered by unnecessary assistance. Finding the point in time where the learning phase of the worker is finished is therefore an important aspect. In this work, we propose and evaluate a novel method to identify the end of the worker’s learning phase. The method makes use of learning curve models and curve fitting in order to determine the progress of the worker.}},
  author       = {{Sehr, Philip and Moriz, Natalia and Heinz-Jakobs, Mario and Trsek, Henning}},
  booktitle    = {{2022 27th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{9781665499965}},
  location     = {{Stuttgart}},
  publisher    = {{IEEE}},
  title        = {{{Am I Done Learning? - Determining Learning States in Adaptive Assembly Systems}}},
  doi          = {{10.1109/ETFA52439.2022.9921676}},
  year         = {{2022}},
}

@inproceedings{11167,
  abstract     = {{Integrity as one property of trustworthiness is an important aspect for the adoption of the Asset Administration Shell (AAS) as a data exchange format and source for data driven services. Until now, the AAS offers an access control solution as a preventive integrity measure. Nevertheless, preventive methods lack in detecting integrity violations due to accidental or malicious modifications from access permitted endpoints. This work in progress paper proposes a concept to complement the access control with a detective integrity measure. By signing submodels of the AAS, business partners along the life cycle can verify the integrity of the data inside the AAS. Therefore, a Certificates Submodel and a Signature Submodel are proposed in the concept to enable a flexible and interoperable integrity verification. In future work, the concept will be implemented and evaluated.}},
  author       = {{Bröring, Andre and Ehrlich, Marco and Wisniewski, Lukasz and Trsek, Henning and Heiss, Stefan}},
  booktitle    = {{2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{ 9781665499965 }},
  location     = {{ Stuttgart}},
  pages        = {{1--4}},
  publisher    = {{IEEE}},
  title        = {{{Towards an Asset Administration Shell Integrity Verification Scheme}}},
  doi          = {{10.1109/ETFA52439.2022.9921521}},
  year         = {{2022}},
}

@inproceedings{11168,
  author       = {{Bröring, Andre and Ehrlich, Marco and Wisniewski, Lukasz and Trsek, Henning and Heiss, Stefan}},
  booktitle    = {{Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022}},
  editor       = {{Jasperneite, Jürgen and Jumar, Ulrich}},
  isbn         = {{978-3-9818463-3-1}},
  location     = {{Lemgo}},
  pages        = {{192--203}},
  publisher    = {{Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe }},
  title        = {{{An Asset Administration Shell Version Control to Enforce Integrity Protection}}},
  doi          = {{10.25644/a4ws-9a49}},
  year         = {{2022}},
}

@inproceedings{11169,
  author       = {{Antonow, Daniel and Gnad, André and Ferfers, Tobias and Trsek, Henning}},
  booktitle    = {{Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022}},
  editor       = {{Jasperneite, Jürgen and Jumar, Ulrich}},
  isbn         = {{ 978-3-9818463-3-1 }},
  location     = {{Lemgo}},
  pages        = {{86--97}},
  publisher    = {{Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe}},
  title        = {{{Concept for Controller-Based Coexistence Management of Diverse Wireless Communication Systems}}},
  doi          = {{10.25644/a4ws-9a49}},
  year         = {{2022}},
}

@inproceedings{11160,
  abstract     = {{The current static risk assessment processes and concepts do not match the increasing requirements with regard to flexibility within the industrial automation domain. The amount of manual tasks and needed efforts for risk assessments are too high in order to adequately cover the rising rate of system reconfigurations. Analysing the typical risk assessment processes from the IEC 62443 will show resource constraints with regard to time, bottlenecks, and the main cost drivers. If the most rewarding process steps can be identified and automated, the overall performance of risk assessments can be enhanced to keep up with the demanded flexibility.}},
  author       = {{Ehrlich, Marco and Lukas, Georg and Trsek, Henning and Jasperneite, Jürgen and Diedrich, Christian}},
  booktitle    = {{Workshop on Factory Communication Systems (WFCS)}},
  isbn         = {{978-1-6654-1087-8}},
  location     = {{Pavia, Italy }},
  publisher    = {{IEEE}},
  title        = {{{Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments}}},
  doi          = {{10.1109/WFCS53837.2022.9779174}},
  year         = {{2022}},
}

@inproceedings{11161,
  author       = {{Mankowski, Andre and Antonow, Daniel and Moriz, Natalia and Trsek, Henning}},
  booktitle    = {{ Automation 2022}},
  isbn         = {{978-3-18-092399-4 }},
  location     = {{Baden-Baden}},
  number       = {{2399}},
  pages        = {{219--230}},
  publisher    = {{VDI Verlag GmbH }},
  title        = {{{Kognitive Automations-Architektur für Cyber-Physische-Produktionssysteme (CPPS)}}},
  year         = {{2022}},
}

@inproceedings{11163,
  abstract     = {{Technologies such as TSN and OPC UA are enablers for converged networks in industrial applications. TSN enables the coexistence of network traffic with real-time requirements and best-effort requirements. On the other hand, OPC UA defines a common information model in addition to secure communication, scalability, and platform independence. The new specification of OPC UA PubSub enables the possibility of implementing OPC UA on the lower levels of the automation pyramid, the field level. Therefore, combining these two technologies can in principle be implemented for every vertical and horizontal communication. This document analyzes the state of the art of OPC UA over TSN and explains the first steps towards an easy to use proof-of-concept for a converged network that is also designed to be a testbed. The testbed will be used to evaluate the interoperability of TSN-capable devices from different vendors. In addition to that, different OPC UA PubSub implementations will be used and benchmarked. These future results will present an overview of the currently available products and provides hands-on experiences for practical implementations of converged networks.}},
  author       = {{Konradi, Oliver and Mankowski, Andre and Wisniewski, Lukasz and Trsek, Henning}},
  booktitle    = {{2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{9781665499965}},
  location     = {{Stuttgart}},
  publisher    = {{IEEE}},
  title        = {{{Towards an Industrial Converged Network with OPC UA PubSub and TSN}}},
  doi          = {{10.1109/ETFA52439.2022.9921646}},
  year         = {{2022}},
}

@misc{12793,
  abstract     = {{Securing factory communication to protect corporate data is an important concern in the context of the Industrial Internet of Things (IIoT). Various cryptographic protocols can be used to establish secure communication channels. One of these protocols is the Transport Layer Security 1.3 (TLS 1.3) protocol. A key component of the TLS handshake protocol is the Elliptic Curve Diffie-Hellman Key Exchange (ECDHKE), a public key cryptosystem used to exchange keys over insecure channels which can be based on a number of standardized elliptic curves. A special form of elliptic curves are Montgomery curves which are advantageous compared to more traditional Weierstrass curves due to their fast arithmetic. This is especially important when the ECDHKE is performed on embedded devices and in time-critical situations. In this work, the performance of ECDHKE implementations using standardized Montgomery curves Curve25519 and Curve448 included in the wolfSSL library are evaluated on an embedded 32-bit STM32L476RG Nucleo development board designed by STMicroelectronics. The benchmark results show that using Curve25519 with around 220ms for the key pair generation and the key agreement respectively is approximately 75% faster than using Curve448 with around 900ms for each of the algorithms, which can be attributed to their differing security levels. These results suggest that the algorithms might not be fast enough for time critical situations.}},
  author       = {{Gebauer, Lisa Helene and Trsek, Henning and Heiss, Stefan}},
  booktitle    = {{2022 IEEE 18th International Conference on Factory Communication Systems (WFCS)}},
  isbn         = {{978-1-6654-1087-8}},
  keywords     = {{secure, factory communication, elliptic curves, ECDHKE, performance, embedded}},
  location     = {{Pavia, ITALY}},
  pages        = {{207--210}},
  publisher    = {{IEEE}},
  title        = {{{Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System}}},
  doi          = {{10.1109/wfcs53837.2022.9779189}},
  year         = {{2022}},
}

@inproceedings{6931,
  abstract     = {{The Asset Administration Shell (AAS) is a core element for Industrie 4.0. In addition, the security of industrial systems is a permanent topic that could be improved by the AAS and should have a high priority for future developments and implementations of the AAS. This paper evaluates the current threat landscape for Industrial Control Systems (ICS) communicating to the AAS, as well as for IT systems hosting the AAS. The relevance of these threats is evaluated for the AAS and the threats with the highest relevance, namely BasicWeb Application Attacks and Malware Infections, are analysed in detail. The recommended countermeasures for these threats are compared with the state of the art of AAS security concepts and result in missing countermeasures and research gaps for an overall security of the AAS.}},
  author       = {{Bröring, Andre and Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz}},
  booktitle    = {{Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021}},
  editor       = {{Jumar, Ulrich and Jasperneite, Jürgen}},
  isbn         = {{978-3-948749101 }},
  location     = {{virtuell}},
  publisher    = {{Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität }},
  title        = {{{Secure usage of asset administration shells : an overview and analysis of best practises}}},
  doi          = {{10.25673/39569}},
  year         = {{2021}},
}

@article{6932,
  abstract     = {{n order to ensure the safety and security of industrial systems with regard to all life cycle phases from development through operation to disposal, specific regulatory and normative requirements are imposed. Due to the digitalization, interconnection, and constantly increasing complexity of manufacturing systems in the context of Industrie 4.0, the manual effort necessary to achieve the required safety and security is becoming ever greater and almost impossible to manage, especially for small and medium-sized enterprises. Therefore, this paper examines the existing challenges in this area in more detail and gives an outlook on the possible solutions to ensure safety and security much quicker and with less manual effort. The overall vision is a (partially) automated risk assessment of modular systems with respect to safety and security, including the alignment of the corresponding processes from both domains and the formalization of the information models needed.}},
  author       = {{Ehrlich, Marco and Bröring, Andre and Harder, Dimitri and Auhagen-Meyer, Torben and Kleen, Philip and Wisniewski, Lukasz and Trsek, Henning and Jasperneite, Jürgen}},
  issn         = {{1613-7620}},
  journal      = {{Elektrotechnik und Informationstechnik : e & i}},
  keywords     = {{safety, security, alignment, automation, processes, models}},
  number       = {{6}},
  pages        = {{454--461}},
  publisher    = {{Springer}},
  title        = {{{Alignment of safety and security risk assessments for modular production systems}}},
  doi          = {{10.1007/s00502-021-00927-9}},
  volume       = {{138}},
  year         = {{2021}},
}

@inproceedings{7087,
  abstract     = {{The Asset Administration Shell (AAS) is a core element for Industrie 4.0. In addition, the security of industrial systems is a permanent topic that could be improved by the AAS and should have a high priority for future developments and implementations of the AAS. This paper evaluates the current threat landscape for Industrial Control Systems (ICS) communicating to the AAS, as well as for IT systems hosting the AAS. The relevance of these threats is evaluated for the AAS and the threats with the highest relevance, namely BasicWeb Application Attacks and Malware Infections, are analysed in detail. The recommended countermeasures for these threats are compared with the state of the art of AAS security concepts and result in missing countermeasures and research gaps for an overall security of the AAS.}},
  author       = {{Bröring, André and Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz}},
  booktitle    = {{Kommunikation in der Automation - KommA 2021}},
  editor       = {{Jasperneite, Jürgen and Jumar, Ulrich}},
  pages        = {{97--106}},
  publisher    = {{ifak}},
  title        = {{{Secure Usage of Asset Administration Shells - An Overview and Analysis of Best Practises}}},
  doi          = {{http://dx.doi.org/10.25673/39569}},
  year         = {{2021}},
}

@misc{11155,
  author       = {{Mankowski, Andre and Priss, Philip and Suton, Jana and Moriz, Natalia and Trsek, Henning}},
  booktitle    = {{Produktion : Technik und Wirtschaft für die deutsche Industrie }},
  issn         = {{0344-6166}},
  number       = {{16}},
  pages        = {{19}},
  publisher    = {{Verl. Moderne Industrie}},
  title        = {{{Projekt DEVEKOS nach vier Jahren erfolgreich abgeschlossen : Neue objektbasierte I4.0-Maschinenarchitektur}}},
  year         = {{2021}},
}

@inproceedings{11156,
  author       = {{Bröring, Andre and Belyaev, Alexander and Trsek, Henning and Wisniewski, Lukasz and Diedrich, Christian}},
  booktitle    = {{Shaping a globally secure Industrie 4.0 Ecosystem - Enabling international interoperable security policies}},
  pages        = {{78--91}},
  publisher    = {{Plattform Industrie 4.0 secretariat}},
  title        = {{{Secure Asset Administration Shell exchange with Distributed Ledger Technology}}},
  year         = {{2021}},
}

@inproceedings{11157,
  abstract     = {{In production environments, manual assembly is often used, when there is a high demand for flexibility which needs to be met economically. In this circumstance, assembly assistance systems are often used to ensure production standards. However, the individual requirements of each worker call for a way for the system to adapt towards the workers needs. This often requires modelling and configuration effort to include expert knowledge into an assistance system. This hinders an economical operation in an industrial environment. In this paper, an approach is presented, facilitating methods of online modelling, to generate a model, which represents the workers behavior during an assembly process. This behavior model is then used to deduce suitable adaptive assembly assistance in real time.}},
  author       = {{Sehr, Philip and Moriz, Natalia and Heinz-Jakobs, Mario and Trsek, Henning}},
  booktitle    = {{2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{978-1-7281-2990-7}},
  location     = {{Vasteras, Sweden }},
  publisher    = {{IEEE}},
  title        = {{{Model-based approach for adaptive assembly assistance}}},
  doi          = {{10.1109/ETFA45728.2021.9613614}},
  year         = {{2021}},
}

@misc{4898,
  author       = {{Bröring, Andre and Belyaev, Alexander and Trsek, Henning and Wisniewski, Lukasz and Diedrich, Christian}},
  booktitle    = {{22. VDI-Kongress AUTOMATION}},
  location     = {{digital}},
  publisher    = {{VDI- Verlag}},
  title        = {{{Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie}}},
  year         = {{2021}},
}

@inproceedings{4512,
  author       = {{Geng, Christoph and Moriz, Natalia and Bunte, Andreas and Trsek, Henning}},
  booktitle    = {{KommA 2020 – Jahreskolloquium Kommunikation in der Automation}},
  location     = {{Lemgo}},
  title        = {{{Concept for Rule-Based Information Aggregation in Modular Production Plants}}},
  year         = {{2020}},
}

@inproceedings{11147,
  abstract     = {{The current developments towards the visions of Industrie 4.0 will create open and dynamic architectures being supervised by Industrial Automation and Control Systems. Due to this new connectivity and flexibility, future industrial production systems need to be inspected during all phases of the whole lifecycle from a security point of view as well. Frequent reconfiguration and adaptation based on smart services impose advanced requirements on the audits and certification with regard to security. To facilitate that, this work presents an approach for the modeling of security requirements and capabilities within the Industrial Reference Architecture and evaluates it based on the concrete system architectures of a number of industrial use cases. The result is the Sec4ICS tooling-based concept for the automated assessment of security-related functionalities within industrial systems.}},
  author       = {{Ehrlich, Marco and Gergeleit, Martin and Trsek, Henning and Lukas, Georg}},
  booktitle    = {{25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  isbn         = {{978-1-7281-8957-4}},
  issn         = {{1946-0759}},
  keywords     = {{Security, Automation, OT, Sec4ICS, iRefA}},
  location     = {{Wien}},
  pages        = {{1640--1647}},
  publisher    = {{IEEE}},
  title        = {{{Towards Automated Security Evaluation within the Industrial Reference Architecture}}},
  doi          = {{10.1109/ETFA46521.2020.9211883}},
  year         = {{2020}},
}

@misc{11153,
  abstract     = {{The developments in the area of Industrie 4.0 and Work 4.0 towards self-organized adaptive
production systems as well as self-organized companies create new demands on technical
and social systems. These include increased flexibility, faster decisions, and transparent com-
munication to address the currently volatile market pressure. As a result, the topic of self-
organization for the industrial domain has moved further into focus and concepts from different
areas, such as nature, social, or management, are being adapted for a technological use. This
article sheds light on self-organisation and the corresponding characteristics that will be nec-
essary for socio-technical systems in the future for industrial companies. The knowledge
gained allows us to establish connections between the technical development of the industrial
domain and the social structures of the involved companies. These insights are used to provide
recommendations for further steps towards the visions from Industrie 4.0.}},
  author       = {{Czybik, Björn and Ehrlich, Marco and Trsek, Henning and Oswald, Alfred}},
  booktitle    = {{Automation 2020}},
  isbn         = {{978-3-18-092375-8 }},
  location     = {{online}},
  pages        = {{1055--1068}},
  publisher    = {{VDI}},
  title        = {{{Eine differenzierte Betrachtung ganzheitlicher Selbstorganisation im Rahmen von Industrie 4.0}}},
  doi          = {{10.51202/9783181023754-1055}},
  volume       = {{2375}},
  year         = {{2020}},
}

@inproceedings{4857,
  abstract     = {{Increasing heterogeneity of industrial network systems is a fact and the chances that in the future one communication standard will be able to fulfill the requirements of all possible applications are utopian. With the increasing number of communication systems, their management, configuration, and maintenance become a significant issue. Additionally, due to the increasing amount of network services and traffic, the management of available network resources and the possibility of delivering certain levels of communication quality of service, especially across different network solutions becomes a big challenge. Therefore, in this paper a Controller of Controllers (CoC) concept for management of heterogeneous industrial networks is proposed. The concept is designed to support still widely spread legacy fieldbus systems, different Ethernet-based industrial solutions, and potentially upcoming network technologies. The goal is achieved by leveraging state-of-the-art architectural concepts such as software-defined networks, which allows for integration of abstract models in network management. The concept is described and discussed by way of a demonstrator concept for a heterogeneous system of fieldbus and Ethernet-based time-sensitive networks.}},
  author       = {{Ansah, F. and Soler Perez Olaya, S. and Krummacker, Dennis and Fischer, C. and Winkel, A. and Guillaume, René and Wisniewski, Lukasz and Ehrlich, Marco and Mandarawi, W. and Trsek, Henning and de Meer, Hermann and Wollschlaeger, Martin and Schotten, Hans D. and Jasperneite, Jürgen}},
  booktitle    = {{16th IEEE International Conference on Factory Communication Systems (WFCS)}},
  editor       = {{Almeida, Lus and Daoud, Ramez and Mifdaoui, Ahlem and Golatowski, Frank and Amer, Hassanein and Santos, Pedro}},
  isbn         = {{978-1-7281-5298-1}},
  keywords     = {{CYBER-PHYSICAL SYSTEMS}},
  location     = {{Porto, PORTUGAL}},
  pages        = {{35--42}},
  publisher    = {{IEEE}},
  title        = {{{Controller of Controllers Architecture for Management of Heterogeneous Industrial Networks}}},
  doi          = {{10.1109/wfcs47810.2020.9114506}},
  year         = {{2020}},
}

@inproceedings{4877,
  author       = {{Ehrlich, Marco and Benk, Stefan and Harder, Dimitri and Kleen, Philip and Trsek, Henning and Schriegel, Sebastian and Jasperneite, Jürgen}},
  title        = {{{Automatische Bewertung und Überwachung von Safety & Security Eigenschaften – Strukturierung und Ausblick}}},
  year         = {{2020}},
}

@misc{11143,
  abstract     = {{Due to the dynamic nature of the Industrie 4.0, future production systems will be reconfigured frequently and as a part of the engineering process, new system configurations will be deployed automatically. In order to keep pace with this development, it will be required to achieve the needed security levels in an automated way and to reduce the current static procedures and manual efforts as much as possible. Therefore, the development and modelling of all cyber security related functionalities is needed. This paper describes an approach for such a modelling based on security requirements and levels of the international standard IEC 62443 part 3-3 and a system description based on OASIS TOSCA for the deployment. The approach is applied to an Industrie 4.0 use case scenario based on edge cloud computing and an evaluation is performed to demonstrate its feasibility.}},
  author       = {{Ehrlich, Marco and Gergeleit, Martin and Simkin, Kostyantyn and Trsek, Henning}},
  booktitle    = {{2019 International Conference on Networked Systems (NetSys)}},
  isbn         = {{978-1-7281-0569-7}},
  location     = {{Garching b. München}},
  publisher    = {{IEEE}},
  title        = {{{Automated Processing of Security Requirements and Controls for a common Industrie 4.0 Use Case}}},
  doi          = {{10.1109/netsys.2019.8854522}},
  year         = {{2019}},
}

@inproceedings{11145,
  abstract     = {{Die vertikale und horizontale Integration von Automatisierungssystemen bilden das Funda-
ment zukünftiger Automatisierungsstrukturen im Sinne von Industrie 4.0. Das bedeutet, dass
die Kommunikation der Systemkomponenten nicht, wie bisher, auf bestimmte Bereiche be-
schränkt, sondern bereichsübergreifend innerhalb eines Unternehmens und sogar über des-
sen Grenzen hinweg stattfinden wird. Die damit einhergehende Problematik ist zum einen
die fehlende Interoperabilität, und zum anderen die Angreifbarkeit dieser offenen Netzwerke
durch mangelnde IT-Sicherheit. Einen wesentlichen Faktor für die Gewährleistung der In-
teroperabilität stellen sogenannte Middleware-Protokolle dar. Eine Middleware liefert einen
Software- und Hardware-unabhängigen Kommunikationsansatz [1]. Verschiedene Middle-
ware-Lösungen verwenden dabei unterschiedliche Ansätze, um eine vertrauenswürdige
Kommunikation sicherzustellen. Eine parallele Nutzung verschiedener Middleware-Lösungen
ist in vielen Fällen nicht zu vermeiden, da unterschiedliche Lieferanten Komponenten mit
unterschiedlichen Protokollen in Anlagen liefern werden. Die parallele Nutzung verschiede-
ner Protokolle impliziert einen höheren organisatorischen Aufwand bezüglich der IT-
Sicherheit. In diesem Beitrag werden die Middleware-Protokolle DDS, MQTT und OPC UA
insbesondere in Bezug auf ihre IT-sicherheitsrelevanten Eigenschaften vorgestellt. Auf die-
ser Grundlage und einer Analyse von IT-Sicherheitsanforderungen der Industrie, wird zu-
nächst ein Ansatz für eine einheitliche Sicherheitsinfrastruktur auf Basis einer Public-Key-
Infrastruktur für alle drei Protokolle konzipiert. Diese wird durch Attributzertifikate als zusätz-
liche Autorisierungskomponente erweitert und evaluiert.}},
  author       = {{Tebbje, S. and Niemann, K.-H. and Friesen, Maxim and Karthikeyan, Gajasri and Heiss, Stefan and Jänicke, L. and Meyer, C. and Trsek, Henning}},
  booktitle    = {{Automation 2019 : 20. Leitkongress der Mess- und Automatisierungstechnik : autonomous systems and 5G in connected industries }},
  isbn         = {{978-3-18-092351-2}},
  location     = {{Baden-Baden}},
  pages        = {{505--516}},
  publisher    = {{VDI Verlag GmbH}},
  title        = {{{Entwicklung einer IT-Sicherheitsinfrastruktur für verteilte Automatisierungssysteme - Integraton verschiedener Middleware- Lösungen in eine durch Attributzertifikate erweiterte, PKI}}},
  doi          = {{10.51202/9783181023518-505}},
  volume       = {{2351}},
  year         = {{2019}},
}

@inproceedings{4756,
  abstract     = {{Due to the dynamic nature of the Industrie 4.0 developments, future production systems will be reconfigured more frequently and new system configurations will be deployed automatically. In order to keep pace with this development, it will be required to observe and ensure the needed security functionalities and corresponding certifications in an automated way. This implies an improvement of today's static procedures and manual efforts as much as possible in favor of a dynamic standard establishment. Therefore, this paper evaluates the state of the art of the industrial security standardization landscape and proposes a concept for the automated support of certification processes with information from industrial communication networks in order to enhance the usability of the standards establishments and the certifications within organizations and companies, especially small and medium-sized enterprises.}},
  author       = {{Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society (IES)}},
  isbn         = {{978-1-7281-4879-3}},
  issn         = {{1553-572X}},
  keywords     = {{Industrial Automation, Security, Toolchain, Standardization, Communication Networks}},
  location     = {{Lisbon, PORTUGAL}},
  pages        = {{2849--2854}},
  publisher    = {{IEEE}},
  title        = {{{Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing}}},
  year         = {{2019}},
}

@inproceedings{4760,
  author       = {{Ehrlich, Marco and Trsek, Henning and Paffrath, Julius and Gergeleit, Martin and Simkin, Kostyantyn and Jasperneite, Jürgen}},
  booktitle    = {{24th International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  title        = {{{Secure and Flexible Deployment of Industrial Applications inside Cloud-Based Environments}}},
  year         = {{2019}},
}

@inproceedings{4840,
  author       = {{Ehrlich, Marco and Wisniewski, Lukasz and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Imperia (Italien)}},
  title        = {{{Modelling and Automatic Mapping of Cyber Security Requirements for Industrial Applications: Survey, Problem Exposition, and Research Focus}}},
  year         = {{2018}},
}

@inproceedings{4847,
  author       = {{Ehrlich, Marco and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Boppard am Rhein}},
  title        = {{{Automatische Evaluierung von Anforderungen bezüglich der Informationssicherheit für das zukünftige industrielle Netzwerkmanagement}}},
  year         = {{2018}},
}

@inproceedings{4580,
  author       = {{Ehrlich, Marco and Biendarra, Alexander and Trsek, Henning and Wojtkowiak, Emanuel and Jasperneite, Jürgen}},
  booktitle    = {{Kommunikation in der Automation - KommA 2017}},
  title        = {{{Passive Flow Monitoring of Hybrid Network Connections regarding Quality of Service Parameters for the Industrial Automation}}},
  year         = {{2017}},
}

@inproceedings{4593,
  author       = {{Ehrlich, Marco and Trsek, Henning and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Zypern}},
  title        = {{{Automatic Mapping of Cyber Security Requirements to support Network Slicing in Software-Defined Networks}}},
  year         = {{2017}},
}

@inproceedings{4601,
  author       = {{Ehrlich, Marco and Trsek, Henning and Lang, Dorota and Wisniewski, Lukasz and Wendt, Verena and Jasperneite, Jürgen}},
  booktitle    = {{Automation 2017}},
  pages        = {{1}},
  publisher    = {{VDI}},
  title        = {{{Security Concept for a Cloud-based Automation Service}}},
  year         = {{2017}},
}

@inproceedings{4868,
  author       = {{Flatt, Holger and Schriegel, Sebastian and Trsek, Henning and Adamczyk, Heiko and Jasperneite, Jürgen}},
  booktitle    = {{21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016)}},
  title        = {{{Analysis of the Cyber-Security of Industry 4.0 Technologies based on RAMI 4.0 and Identification of Requirements}}},
  year         = {{2016}},
}

@inproceedings{4869,
  abstract     = {{Jede Steigerung der Digitalisierung, Informationstransparenz und Standardisierung macht Produktionsanlagen angreifbarer. In diesem Beitrag wird am Beispiel einer Cloud-basierten Produktionsüberwachung das Vorgehensmodell einer Cybersicherheitsanalyse anhand des Referenzarchitekturmodells Industrie-4.0 (RAMI 4.0) und der Richtlinie VDI/VDE 2182 gezeigt. Das Vorgehen hilft dabei, den Bedarf an Schutzmaßnahmen für spezifische Applikationen zu identifizieren und ermöglicht die risikobasierte Auswahl von Gegenmaßnahmen zur Absicherung.}},
  author       = {{Flatt, Holger and Schriegel, Sebastian and Trsek, Henning and Adamczyk, Heiko and Jasperneite, Jürgen}},
  booktitle    = {{atp edition}},
  title        = {{{Industrie 4.0 IT-Sicherheit}}},
  year         = {{2016}},
}

@inproceedings{4879,
  abstract     = {{Die vollständige Digitalisierung der industriellen Produktion und die entstehende neue Qualität an Informationstransparenz sind die Grundlage für die Mehrwerte Effektivität, Qualität und Individualität. Diesem Mehrwertpotential stehen Gefahren der Cyber-Sicherheit entgegen: Jede Steigerung der Digitalisierung, Informationstransparenz und Standardisierung macht Produktionsanlagen angreifbarer. Das Referenz Architektur Model Industrie 4.0 (RAMI 4.0) ermöglicht die Abbildung aller Instanzen einer Industrie 4.0-Anwendung über den gesamten Lebenszyklus und kann so bei der Analyse der Cyber-Sicherheit von Industrie 4.0-Technologien unterstützen. In diesem Beitrag wird am Beispiel einer Cloud-basierten Produktionsüberwachung das Vorgehensmodel einer Cyber-Sicherheitsanalyse anhand RAMI 4.0 und der Richtlinie VDI/VDE 2182 gezeigt. Das Vorgehen unterstützt bei der Identifikation von Schutzbedarfen spezifischer Applikationen und ermöglicht die Risiko-basierte Auswahl von Gegenmaßnahmen zur Absicherung.}},
  author       = {{Flatt, Holger and Schriegel, Sebastian and Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{Automation 2016}},
  title        = {{{Analyse der Cyber-Sicherheit von Industrie 4.0-Technologien auf Basis des RAMI 4.0 und Identifikation von Lösungsbedarfen}}},
  year         = {{2016}},
}

@article{2140,
  abstract     = {{Recent industrial applications are implemented in a modular way, resulting in flexibility during the whole life cycle, i.e., setup, operation, and maintenance. This applies especially to larger applications like logistic, production, and printing processes. Their modular character is resulting from the constantly increasing complexity of such installations, which makes their supervision for securing reliable operation a difficult task: the data of hundreds (if not thousands) of signal sources must be acquired, communicated, and evaluated for system diagnosis. In this contribution we summarize the challenges arising in such applications and show that distributed sensor and information fusion for modular self-diagnosis tackles these challenges. Here, we propose an innovative distributed architecture encompassing intelligent sensor nodes, self-configuring real-time communication networks, and a suitable sensor and information fusion system for condition monitoring. New challenges arise in the context of distributed information fusion systems, which are identified and to which an outlook on future solutions is provided. A number of these solutions have already been discovered, implemented, and are evaluated in the context of a demonstrator, which resembles a real-world printing application.}},
  author       = {{Mönks, Uwe and Trsek, Henning and Dürkop, Lars and Geneiß, Volker and Lohweg, Volker}},
  issn         = {{0957-4158}},
  journal      = {{Mechatronics}},
  keywords     = {{Cyber-physical systems, Information fusion, Fusion system design, Intelligent sensors, Self-configuration, Intelligent networking}},
  number       = {{34}},
  pages        = {{63--71}},
  publisher    = {{Elsevier}},
  title        = {{{Towards distributed intelligent sensor and information fusion}}},
  doi          = {{10.1016/j.mechatronics.2015.05.005}},
  year         = {{2015}},
}

@inproceedings{2146,
  abstract     = {{The increased deployment of information technology for information processing, extensive networking, and system/environment monitoring using sensor and information fusion systems are essential characteristics of cyber-physical systems. They allow an autonomous recognition and evaluation of the system's status leading to autonomous reactions improving or maintaining the status to operate adaptively, robustly, anticipatory, and user-friendly. Assisting the operator in handling such complex systems is rather important and requires self-configuration, self-diagnosis, and self-optimization capabilities. In this paper, a new assisted design methodology for sensor and information fusion systems is proposed. It is based on an innovative system architecture consisting of the information fusion system itself, intelligent adaptable sensors, and the communication architecture of the "Intelligent Technical Systems OstWestfalenLippe" (it's OWL) Leading-Edge Cluster project "Intelligent Networking" providing an intelligent network for self-configuration and the required real-time data exchange.}},
  author       = {{Mönks, Uwe and Trsek, Henning and Dürkop, Lars and Geneiß, Volker and Lohweg, Volker}},
  booktitle    = {{2nd International Conference on System-integrated Intelligence}},
  issn         = {{2212-0173}},
  pages        = {{35--45}},
  title        = {{{Assisting the Design of Sensor and Information Fusion Systems}}},
  doi          = {{https://doi.org/10.1016/j.protcy.2014.09.032}},
  volume       = {{15}},
  year         = {{2014}},
}

@inproceedings{4553,
  author       = {{Imtiaz, Jahanzaib and Jasperneite, Jürgen and Trsek, Henning}},
  location     = {{Toulouse, France}},
  title        = {{{Control-as-a-Service from the Cloud: A Case Study for using Virtualized PLCs}}},
  year         = {{2014}},
}

@inproceedings{4554,
  author       = {{Dürkop, Lars and Trsek, Henning and Otto, Jens and Jasperneite, Jürgen}},
  location     = {{Toulouse}},
  title        = {{{A field level architecture for reconfigurable real-time automation systems}}},
  year         = {{2014}},
}

@article{4557,
  author       = {{Gausemeier, Jürgen and Dumitrescu, Roman and Jasperneite, Jürgen and Kühn, Arno and Trsek, Henning}},
  journal      = {{ZWF - Zeitschrift für wirtschaftlichen Fabrikbetrieb}},
  number       = {{5}},
  pages        = {{336--346}},
  title        = {{{Der Spitzencluster it’s OWL auf dem Weg zu Industrie 4.0}}},
  year         = {{2014}},
}

@misc{4884,
  author       = {{Gausemeier, Jürgen and Dumitrescu, Roman and Jasperneite, Jürgen and Kühn, Arno and Trsek, Henning}},
  publisher    = {{Imagebroschüre des Spitzenclusters zum Thema Industrie 4.0}},
  title        = {{{Auf dem Weg zu Industrie 4.0: Lösungen aus dem Spitzencluster it´s OWL}}},
  year         = {{2014}},
}

@inproceedings{4647,
  author       = {{Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{18th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  title        = {{{Cloud Computing for Industrial Automation Systems - A Comprehensive Overview}}},
  year         = {{2013}},
}

@inproceedings{4648,
  author       = {{Trsek, Henning and Tack, Tim and Jasperneite, Jürgen and Nett, Edgar}},
  booktitle    = {{18th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}},
  title        = {{{Towards an Isochronous Wireless Communication System for Industrial Automation}}},
  year         = {{2013}},
}

@inproceedings{4652,
  author       = {{Dürkop, Lars and Imtiaz, Jahanzaib and Trsek, Henning and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{11th International IEEE Conference on Industrial Informatics}},
  title        = {{{Using OPC-UA for the Autoconfiguration of Real-time Ethernet Systems }}},
  year         = {{2013}},
}

@inproceedings{4660,
  author       = {{Dürkop, Lars and Imtiaz, Jahanzaib and Trsek, Henning and Wisniewski, Lukasz and Jasperneite, Jürgen}},
  booktitle    = {{11th International IEEE Conference on Industrial Informatics}},
  title        = {{{Using OPC-UA for the Autoconfiguration of Real-time Ethernet Systems }}},
  year         = {{2013}},
}

@misc{8215,
  author       = {{Block, D. and Trsek, Henning and Meier, Uwe}},
  booktitle    = {{RADCOM 2013 - Radar, Communication and Measurement, April 24 - 25, 2013, Hamburg, Germany}},
  publisher    = {{RADCOM}},
  title        = {{{Real-Time Characterization of Fast-Varying Industrial Wireless Channels}}},
  year         = {{2013}},
}

@inproceedings{4539,
  author       = {{Dürkop, Lars and Trsek, Henning and Jasperneite, Jürgen and Wisniewski, Lukasz}},
  location     = {{Krakau, Poland}},
  title        = {{{Towards Autoconfiguration of Industrial Automation Systems: A Case Study Using PROFINET IO}}},
  year         = {{2012}},
}

@inbook{4541,
  abstract     = {{Arbeitsgruppe 2 des Nationalen IT-Gipfels}},
  author       = {{Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{Digitale Infrastrukturen - Jahrbuch 2012/2013 Nationaler IT-Gipfel }},
  location     = {{Berlin}},
  pages        = {{199 -- 230}},
  title        = {{{Machine-to-Machine-Kommunikation - Eine Chance für die deutsche Industrie}}},
  year         = {{2012}},
}

@inproceedings{4543,
  author       = {{Dürkop, Lars and Imtiaz, Jahanzaib and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Lemgo}},
  title        = {{{Service Oriented Architecture for the Auto-configuration of Real-Time Ethernet Systems}}},
  year         = {{2012}},
}

@inproceedings{4685,
  author       = {{Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{2011 International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS 2011)}},
  title        = {{{An isochronous medium access control for real-time wireless communications in industrial automation systems - A use case for wireless clock synchronization}}},
  year         = {{2011}},
}

@inproceedings{4690,
  author       = {{Trsek, Henning and Schwalowsky, Stefan and Czybik, Björn and Jasperneite, Jürgen}},
  booktitle    = {{16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011)}},
  title        = {{{Implementation of an advanced IEEE 802.11 WLAN AP for real-time wireless communications}}},
  year         = {{2011}},
}

@inproceedings{4696,
  author       = {{Schriegel, Sebastian and Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{VDI Kongress AUTOMATION 2011 Baden-Baden}},
  title        = {{{Komplementärer Einsatz von IEC 61850 und IEC 61158 für den optimalen Betrieb von Windenergieanlagen in intelligenten Energienetzen.}}},
  year         = {{2011}},
}

@article{4699,
  author       = {{Deppe, Jan and Trsek, Henning and Jasperneite, Jürgen}},
  journal      = {{Elektronik}},
  title        = {{{WLAN Geräte für die Industrie im Vergleich - Teil II}}},
  volume       = {{10}},
  year         = {{2011}},
}

@article{4700,
  author       = {{Trsek, Henning and Jasperneite, Jürgen and Heiss, Stefan}},
  issn         = {{1869-2087}},
  journal      = {{Lemgoer Schriftenreihe zur industriellen Informationstechnik = Lemgo series on industrial information technology }},
  publisher    = {{inIT}},
  title        = {{{RAvE - Real-time automation networks in moving industrial environments}}},
  volume       = {{6}},
  year         = {{2011}},
}

@inbook{4701,
  author       = {{Trsek, Henning and Jasperneite, Jürgen and Lo Bello, Lucia and Manic, Milos}},
  booktitle    = {{ Industrial Electronics Handbook}},
  pages        = {{48--1 -- 48--13}},
  publisher    = {{CRC Press}},
  title        = {{{Wireless Local Area Networks}}},
  year         = {{2011}},
}

@article{4704,
  author       = {{Wisniewski, Lukasz and Trsek, Henning and Jasperneite, Jürgen}},
  journal      = {{Journal: MANAGEMENT AND PRODUCTION ENGINEERING REVIEW}},
  number       = {{1}},
  title        = {{{Wireless local area networks and its impact on current and future production processes }}},
  volume       = {{2}},
  year         = {{2011}},
}

@article{4705,
  author       = {{Deppe, Jan and Trsek, Henning and Jasperneite, Jürgen}},
  journal      = {{Elektronik}},
  title        = {{{WLAN Geräte für die Industrie im Vergleich - Teil I}}},
  volume       = {{06}},
  year         = {{2011}},
}

@book{5611,
  author       = {{Trsek, Henning and Jasperneite, Jürgen and Heiss, Stefan}},
  issn         = {{1869-2087}},
  title        = {{{ RAvE - Real-time automation networks in moving industrial environments}}},
  year         = {{2011}},
}

@inproceedings{4467,
  author       = {{Dominguez, Ivan and Wisniewski, Lukasz and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Nancy, France}},
  title        = {{{Link-Layer Retransmissions in IEEE 802.11g based Industrial Networks}}},
  year         = {{2010}},
}

@inproceedings{4523,
  author       = {{Schäfermann, Mark and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Bochum}},
  title        = {{{Untersuchung von Mobilfunknetzen für zuverlässige M2M-Anwendungen}}},
  year         = {{2010}},
}

@inproceedings{4710,
  author       = {{Tabassam, Ahmad Ali and Trsek, Henning and Heiss, Stefan and Jasperneite, Jürgen}},
  booktitle    = {{5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNET)}},
  title        = {{{Fast and Seamless Handover for Secure Mobile Industrial Applications with 802.11r}}},
  year         = {{2009}},
}

@inproceedings{4711,
  author       = {{Schriegel, Sebastian and Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{2009 International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication}},
  title        = {{{Enhancement for a Clock Synchronization Protocol in Heterogeneous Networks}}},
  year         = {{2009}},
}

@inproceedings{4713,
  author       = {{Trsek, Henning and Faltinski, Sebastian and Jasperneite, Jürgen and Dominguez, Ivan}},
  booktitle    = {{11. Wireless Technologies Kongress 2009}},
  title        = {{{IEEE 802.11n für die industrielle Automatisierung – Welche Vorteile bringt der neue WLAN Standard?}}},
  year         = {{2009}},
}

@article{4427,
  author       = {{Jasperneite, Jürgen and Trsek, Henning}},
  journal      = {{Computer & Automation}},
  pages        = {{44--48}},
  title        = {{{Schnell von Zelle zu Zelle}}},
  volume       = {{2}},
  year         = {{2008}},
}

@inproceedings{4443,
  author       = {{Hameed, Mohsin  and Trsek, Henning and Graeser, Olaf and Jasperneite, Jürgen}},
  location     = {{Hamburg}},
  title        = {{{Performance Investigation and Optimization of IEEE802.15.4 for Industrial Wireless Sensor Networks}}},
  year         = {{2008}},
}

@inproceedings{4446,
  author       = {{Jasperneite, Jürgen and Trsek, Henning}},
  location     = {{Bochum}},
  title        = {{{Reproduzierbare Leistungsmessungen und Konformitäts-/Interoperabilitätstests von IEEE 802.11 WLAN Implementierungen}}},
  year         = {{2008}},
}

@inproceedings{4449,
  author       = {{Graeser, Olaf and Trsek, Henning and Jasperneite, Jürgen}},
  location     = {{Rennes, France}},
  title        = {{{Investigations on Traffic Patterns for Timing Requirements of an Industrial Real-Time System in Factory Automation}}},
  year         = {{2008}},
}

@inproceedings{4726,
  author       = {{Trsek, Henning and Jasperneite, Jürgen and Lessmann, Gunnar}},
  booktitle    = {{7th IFAC International Conference on Fieldbuses and nETworks in industrial and embedded systems}},
  title        = {{{A Concept for the System Integration of Wireless Sensor Networks to Industrial Automation Systems using PROFINET}}},
  year         = {{2007}},
}

@inproceedings{4730,
  author       = {{Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{Wireless Technologies Kongress 2007}},
  editor       = {{Wollert, Jörg F.}},
  pages        = {{78--85}},
  title        = {{{Drahtlose Sensor- und Aktornetze mit 802.15.4 in der Fertigungsautomatisierung - Utopie oder Wirklichkeit?}}},
  year         = {{2007}},
}

@inproceedings{4734,
  author       = {{Trsek, Henning and Jasperneite, Jürgen}},
  booktitle    = {{VDI/VDE GMA-Kongress 2007}},
  title        = {{{Mobiles PROFINET mit schnellen Zellwechseln in großflächigen industriellen WLAN Netzwerken -Aktueller Stand und Perspektive}}},
  year         = {{2007}},
}

@inproceedings{4736,
  author       = {{Trsek, Henning and Jasperneite, Jürgen}},
  publisher    = {{Vortrag 4. Fachwissenschaftliches Kolloquium für Angewandte Automatisierungstechnik in Lehre und Entwicklung an Fachhochschulen (AALE2007) in Lemgo}},
  title        = {{{Drahtlos vernetzte regelungstechnische Anwendungen}}},
  year         = {{2007}},
}

@inproceedings{4424,
  author       = {{Jasperneite, Jürgen and Karanam, S.P. and Trsek, Henning}},
  location     = {{Torino, Italy}},
  title        = {{{Potential of the HCCA scheme defined in IEEE802.11e for QoS enabled Industrial Wireless Networks}}},
  year         = {{2006}},
}

@inproceedings{4425,
  author       = {{Jasperneite, Jürgen and Trsek, Henning}},
  location     = {{Prague}},
  title        = {{{A Simulation Case Study of the new IEEE 802.11e HCCA mechanism in Industrial Wireless Networks}}},
  year         = {{2006}},
}

@inproceedings{4426,
  author       = {{Jasperneite, Jürgen and Trsek, Henning}},
  booktitle    = {{Wireless technologies : von der Technologie zur Anwendung : 8. Kongress, 27. - 28. September 2006, Dortmund }},
  editor       = {{Wollert, Jörg}},
  isbn         = {{978-3-18-377210-0}},
  location     = {{Dortmund}},
  number       = {{772}},
  pages        = {{177--184}},
  publisher    = {{VDI-Verl. }},
  title        = {{{Leistungsbewertung einer zentralisierten WLAN Infrastruktur für mobile Anwendungen mit Echtzeit Anforderungen in industriellen Automatisierungsnetzwerken}}},
  volume       = {{10}},
  year         = {{2006}},
}

@inproceedings{4738,
  author       = {{Trsek, Henning and Jasperneite, Jürgen and Meier, Uwe}},
  booktitle    = {{7. Wireless Kongress}},
  title        = {{{Bewertung des WLAN Standards 802.11e für den Einsatz in der industriellen Automatisierungetchnik}}},
  year         = {{2005}},
}

