Contact

University of Oldenburg Faculty II - Department of Computer Science Department Safety-Security-Interaction 26111 Oldenburg

Secretariat

Ingrid Ahlhorn

A03 2-208

+49 (0) 441 - 798 2426

Safety-Security-Interaction

Welcome to the Safety-Security-Interaction Group!

The Safety-Security-Interaction group is concerned with the development of theoretically sound technologies for maintaining the security of IT systems in the context of safety-critical systems and the Internet of Things. The main emphasis lies on developing security solutions tailored to the context-specific conditions in safety-critical systems, thereby giving special importance to studying the interaction between the security and the safety of the systems to be protected.

Job announcement

Ph.D. Position in IoT Security; Application deadline: 8 March 2026

News

Article at ICISSP 2024!

Our paper „RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable within a Designated Area” got accepted at ICISSP 2024!

Our paper „RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable within a Designated Area” got accepted at ICISSP 2024!

Short summary:

We present a WiFi signal-based, volatile key extraction system called RoomKey. We derive a room’s key by creating a deterministic key from the ever-changing WiFi environment and investigating the extraction capabilities of a designated area. RoomKey uses wireless beacon frames as a component, which we combine with a strong random key to generate and reconstruct the same volatile key of the room. We provide an exemplary use case by utilizing RoomKey as an authentication factor using the location-specific WiFi environment as an authentication claim. We identified and solved two problems in using location as an authentication factor: location being privacy sensitive, and the location of a user constantly changing. We mitigate privacy concerns by recognizing a particular location without the need to localize its precise geographical coordinates. To overcome the problem of location change, we restrict locations to work environments for laptop usage and allow a per-location-predetermined, designated area (e.g., a room). With the RoomKey concept, we demonstrate the potential of including environmental WiFi measurements for volatile key extraction and show the possibility of creating location-aware and privacy-preserving authentication systems for continuous authentication and adaptive security measures.

» Publications

(Changed: 11 Feb 2026)  Kurz-URL:Shortlink: https://uol.de/p81251n8743en
Zum Seitananfang scrollen Scroll to the top of the page

This page contains automatically translated content.