Michael Menth
YOU?
Author Swipe
View article: T(SN)-Ray: Gauging TAS and PSFP Delays of TSN Switches for Predictable Deterministic Networking
T(SN)-Ray: Gauging TAS and PSFP Delays of TSN Switches for Predictable Deterministic Networking Open
Time-Sensitive Networking (TSN) allows for scheduling periodic traffic in Ethernet networks, i.e., sending the traffic such that the traffic encounters minimal delay in intermediate nodes. TSN has two novel features Time-Aware Shaper (TAS)…
View article: Impact of Packet Loss and Timing Errors on Scheduled Periodic Traffic with Time-Aware Shaping (TAS) in Time-Sensitive Networking (TSN)
Impact of Packet Loss and Timing Errors on Scheduled Periodic Traffic with Time-Aware Shaping (TAS) in Time-Sensitive Networking (TSN) Open
Time-Sensitive Networking (TSN) is a collection of mechanisms to enhance the realtime transmission capability of Ethernet networks. TSN combines priority queuing, traffic scheduling, and the Time-Aware Shaper (TAS) to carry periodic traffi…
View article: Enhancements to P4TG: Histogram-Based RTT Monitoring in the Data Plane
Enhancements to P4TG: Histogram-Based RTT Monitoring in the Data Plane Open
Modern traffic generators are essential tools for evaluating the performance of network environments. P4TG is a P4-based traffic generator implemented for Intel Tofino switches that offers high-speed packet generation with fine-grained mea…
View article: Stack Management for MPLS Network Actions: Integration of Nodes with Limited Hardware Capabilities
Stack Management for MPLS Network Actions: Integration of Nodes with Limited Hardware Capabilities Open
The MPLS Network Actions (MNA) framework enhances MPLS forwarding with a generalized encoding for manifold extensions such as network slicing and in-situ OAM (IOAM). Network actions in MNA are encoded in Label Stack Entries (LSEs) and are …
View article: Rust Barefoot Runtime (RBFRT): Fast Runtime Control for the Intel Tofino
Rust Barefoot Runtime (RBFRT): Fast Runtime Control for the Intel Tofino Open
Data plane programming enables the programmability of network devices with domain-specific programming languages, like P4. One commonly used P4-programmable hardware target is the Intel Tofino™ switching ASIC. The runtime behavior of an im…
View article: Packet Level Resilience for the User Plane in 5G Networks
Packet Level Resilience for the User Plane in 5G Networks Open
The growing demands of ultra-reliable and low-latency communication (URLLC) in 5G networks necessitate enhanced resilience mechanisms to address user plane failures caused by outages, hardware defects, or software bugs. An important aspect…
View article: Enhancements to P4TG: Protocols, Performance, and Automation
Enhancements to P4TG: Protocols, Performance, and Automation Open
P4TG is a hardware-based traffic generator (TG) running on the Intel Tofino 1 ASIC and was programmed using the programming language P4. In its initial version, P4TG could generate up to 10x100 Gb/s of traffic and directly measure rates, p…
View article: Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth2 and OIDC
Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth2 and OIDC Open
The Plug-and-Charge (PnC) process defined by ISO 15118 standardizes automated Electric Vehicle (EV) charging by enabling automatic installation of credentials and use for authentication between EV and Charge Point (CP). However, the curren…
View article: A Survey of Post-Quantum Cryptography Migration in Vehicles
A Survey of Post-Quantum Cryptography Migration in Vehicles Open
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum …
View article: Erratum to “MPLS Network Actions: Technological Overview and P4-Based Implementation on a High-Speed Switching ASIC”
Erratum to “MPLS Network Actions: Technological Overview and P4-Based Implementation on a High-Speed Switching ASIC” Open
Presents corrections to the paper, Erratum to “MPLS Network Actions: Technological Overview and P4-Based Implementation on a High-Speed Switching ASIC”.
View article: MPLS Network Actions: Technological Overview and P4-Based Implementation on a High-Speed Switching ASIC
MPLS Network Actions: Technological Overview and P4-Based Implementation on a High-Speed Switching ASIC Open
In MPLS, packets are encapsulated with labels that add domain-specific forwarding information. Special purpose labels were introduced to trigger special behavior in MPLS nodes but their number is limited. Therefore, the IETF proposed the M…
View article: A Unified Inter-Domain QoS Signaling Scheme for Time-Sensitive Networking
A Unified Inter-Domain QoS Signaling Scheme for Time-Sensitive Networking Open
Time-Sensitive Networking (TSN) is an enhancement of Ethernet. It provides real-time capabilities in Layer-2 networks and guarantees quality of service (QoS) for data streams. TSN defines three different configuration models that specify h…
View article: Streamlining Plug-and-Charge Authorization for Electric Vehicles With OAuth 2 and OpenID Federation
Streamlining Plug-and-Charge Authorization for Electric Vehicles With OAuth 2 and OpenID Federation Open
The Plug-and-Charge (PnC) standard defined in ISO 15118 facilitates simple Electric Vehicle (EV) charging with modern Charge Points (CPs). When drivers plug in their EV into a CP, the EV authenticates itself to the CP with a so-called cont…
View article: Beekeeper: Accelerating Honeypot Analysis With LLM-Driven Feedback
Beekeeper: Accelerating Honeypot Analysis With LLM-Driven Feedback Open
Honeypots are decoy resources intended to entice adversaries and collect threat intelligence in the process. The amount and quality of the collected insights strongly correlate with the honeypot’s credibility to the adversary. However, the…
View article: ALDExA: Automated LLM-Assisted Detection of CVE Exploitation Attempts in Host-Captured Data
ALDExA: Automated LLM-Assisted Detection of CVE Exploitation Attempts in Host-Captured Data Open
Currently, the detection of Common Vulnerabilities and Exposures (CVE) exploitation attempts heavily depends on rule sets manually written for the detection unit. As the number of published CVEs increases each year, there is a need to adva…
View article: Cognitive behavioral therapy for pediatric obsessive-compulsive disorder delivered via internet videoconferencing: a manualized sensor-assisted feasibility approach
Cognitive behavioral therapy for pediatric obsessive-compulsive disorder delivered via internet videoconferencing: a manualized sensor-assisted feasibility approach Open
Background Between 1 and 4% of children and adolescents suffer from obsessive-compulsive disorder (OCD) worldwide, but the majority of these young people do not have access to cognitive behavioral therapy (CBT) as a first-line treatment. C…
View article: MPLS Network Actions: Technological Overview and P4-Based Implementation on a High-Speed Switching ASIC
MPLS Network Actions: Technological Overview and P4-Based Implementation on a High-Speed Switching ASIC Open
In MPLS, packets are encapsulated with labels that add domain-specific forwarding information. Special purpose labels were introduced to trigger special behavior in MPLS nodes but their number is limited. Therefore, the IETF proposed the M…
View article: Lessons learned from a multimodal sensor-based eHealth approach for treating pediatric obsessive-compulsive disorder
Lessons learned from a multimodal sensor-based eHealth approach for treating pediatric obsessive-compulsive disorder Open
Introduction The present study investigates the feasibility and usability of a sensor-based eHealth treatment in psychotherapy for pediatric obsessive-compulsive disorder (OCD), and explores the promises and pitfalls of this novel approach…
View article: Extensions to BIER Tree Engineering (BIER-TE) for Large Multicast Domains and 1:1 Protection: Concept, Implementation and Performance
Extensions to BIER Tree Engineering (BIER-TE) for Large Multicast Domains and 1:1 Protection: Concept, Implementation and Performance Open
Bit Index Explicit Replication (BIER) has been proposed by the IETF as a stateless multicast transport technology. BIER adds a BIER header containing a bitstring indicating receivers of an IP multicast (IPMC) packet within a BIER domain. B…
View article: Implementation and Evaluation of IEEE 802.11ax Target Wake Time Feature in ns-3
Implementation and Evaluation of IEEE 802.11ax Target Wake Time Feature in ns-3 Open
The Target Wake Time (TWT) feature has been introduced in Wi-Fi technology in 802.11ah and has been extended by IEEE 802.11ax as an optional feature. It allows stations (STAs) to sleep for some intervals and wake up at a Target Wake Time t…
View article: Firewall-as-a-Service for Campus Networks Based on P4-SFC
Firewall-as-a-Service for Campus Networks Based on P4-SFC Open
Taking care of security is a crucial task for every operator of a campus network. One of the most fundamental security-related network functions that can be found in most networks for this purpose are stateful firewalls. However, deploying…
View article: Autonomous Integration of TSN-unaware Applications with QoS Requirements in TSN Networks
Autonomous Integration of TSN-unaware Applications with QoS Requirements in TSN Networks Open
Modern industrial networks transport both best-effort and real-time traffic. Time-Sensitive Networking (TSN) was introduced by the IEEE TSN Task Group as an enhancement to Ethernet to provide high quality of service (QoS) for real-time tra…
View article: Segment-Encoded Explicit Trees (SEETs) for Stateless Multicast: P4-Based Implementation and Performance Study
Segment-Encoded Explicit Trees (SEETs) for Stateless Multicast: P4-Based Implementation and Performance Study Open
IP multicast (IPMC) is used to efficiently distribute one-to-many traffic within networks. It requires per-group state in core nodes and results in large signaling overhead when multicast groups change. Bit Index Explicit Replication (BIER…
View article: OIDC²: Open Identity Certification With OpenID Connect
OIDC²: Open Identity Certification With OpenID Connect Open
OpenID Connect (OIDC) is a widely used authentication standard for the Web. In this work, we define a new Identity Certification Token (ICT) to enable end-to-end user authentication by using and extending OIDC’s native mechanisms. An ICT c…
View article: Efficient Robust Schedules (ERS) for Time-Aware Shaping in Time-Sensitive Networking
Efficient Robust Schedules (ERS) for Time-Aware Shaping in Time-Sensitive Networking Open
Time-Sensitive Networking (TSN) extends Ethernet bridging with features for deterministic transmission. Periodic streams may be scheduled such that their frames hardly interfere in bridges. Additionally, the Time-Aware Shaper (TAS) can kee…
View article: P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking
P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking Open
Time-Sensitive Networking (TSN) extends Ethernet to enable real-time communication. In TSN, bounded latency and zero congestion-based packet loss are achieved through mechanisms such as the Credit-Based Shaper (CBS) for bandwidth shaping a…
View article: $OIDC^2$: Open Identity Certification with OpenID Connect
$OIDC^2$: Open Identity Certification with OpenID Connect Open
OpenID Connect (OIDC) is a widely used authentication standard for the Web. In this work, we define a new Identity Certification Token (ICT) for OIDC. An ICT can be thought of as a JSON-based, short-lived user certificate for end-to-end us…
View article: P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN
P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN Open
802.1X, MACsec, and IPsec are widespread network security mechanisms that control network access and add encryption and authentication to L2 and L3 networking. They are standardized by IEEE and IETF, and are part of most open-source and co…