Dr. rer. nat. Jörg Daubert

Picture taken by Henry Stadthagen
NameJörg Daubert
PositionSenior Researcher & Area Head
Smart Protection in Infrastructures
and Networks (SPIN)
Emaildaubert(at)tk.tu-darmstadt.de 
Phone +49 (6151) 16 - 23191
Fax+49 (6151) 16 - 23202
OfficeS2|02 A 121
Postal addressTU Darmstadt - FB 20
FG Telekooperation
Hochschulstraße 10
D-64289 Darmstadt
Germany

Research Interests

  • Trustworthy mobile devices
  • Privacy & trust
  • Anonymous overlay networks
  • Publish-subscribe

Short Bio

Jörg Daubert studied computer science with a focus on IT management until 2011. In 2016, he obtained his Ph.D. with the thesis on "Anonymous Publish/Subscribe Overlays" at Technische Universität in Darmstadt. Since 2014 he is acting as Area Head of the "Secure Smart Infrastructures" group; since 2016 he is joint PostDoc and Area Head of the "Smart Protection in Infrastructures and Networks" (SPIN) group with 9 researchers within the Telecooperation Lab under Prof. Mühlhäuser in Darmstadt. Starting 2016, Jörg Daubert is also coordinating the research training group (doctoral college) "Privacy and Trust for Mobile Users" with 11 Ph.D. student positions.

Jörg Daubert also worked in industrial research for AGT International, a major industry player in Internet of Things and data analytics, from 2011 to 2015 and is freelancing as an IT consultant from 2011 onwards.

Topics for Bachelor and Master Theses

Please have a look at https://www.tk.informatik.tu-darmstadt.de/de/teaching/abschlussarbeiten-d/ for open theses. We often offer a selection of challenging topics in the area of privacy-preserving communication networks. The focus can be either theoretical – developing attack and protection concepts, or practical – analyzing the aforementioned attacks and concepts via simulation. You can write the thesis in English or German.

Publications

Additional Attributes

Type

Improved Distribution of Locally Sourced Energy in Smart Grids During Brownouts and in Times of Energy Scarcity

Rolf Egert, Florian Volk, Jörg Daubert, Max Mühlhäuser
In: International Journal On Advances in Systems and Measurements, Vol. 10, December 2017
[Article]

Challenges and Available Solutions against Organized Cyber-Crime and Terrorist Networks

Andrea Tundis, Florian Huber, Bernhard Jäger, Jörg Daubert, Emmanouil Vasilomanolakis, Max Mühlhäuser
In: International Conference on Safety and Security Engineering, September 2017
[Inproceedings]

Cover Traffic: A Trade of Anonymity and Efficiency

Tim Grube, Markus Thummerer, Jörg Daubert, Max Mühlhäuser
In: to appear in: 13th International Workshop on Security and Trust Management in conjunction with the 22th European Symposium On Research in Computer Security (ESORICS 2017), September 2017
[Inproceedings]

Constrained PET Composition for Measuring Enforced Privacy

Sebastian Funke, Alexander Wiesmaier, Jörg Daubert
In: ARES 2017, p. to appear, September 2017
[Inproceedings]

Beyond the Hype: On Using Blockchains in Trust Management for Authentication

Nikolaos Alexopoulos, Jörg Daubert, Max Mühlhäuser, Sheikh Mahbub Habib
In: TrustCom, August 2017
IEEE
[Online-Edition: http://stprp-activity.com/TrustCom2017]
[Inproceedings]

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende

Sebastian Funke
In: Proceedings of the DACH Security 2017, p. 1-10, June 2017
DACH Security 2017
[Inproceedings]

GRK 2050: D.4 AlterEgo

Jörg Daubert
In: Proceedings of the11th Joint Workshop of the German Research Training Groups in Computer Science, June 2017
Schloß Dagstuhl
[Inproceedings]

Mitigating Brown-Outs: Fair Distribution of Locally Sourced Energy in Smart Grids

Rolf Egert, Florian Volk, Jörg Daubert, Max Mühlhäuser
In: The Seventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies - ENERGY 2017, May 2017
IARIA
[Inproceedings]

Ant Colonies for Efficient and Anonymous Group Communication Systems

Tim Grube, Sascha Hauke, Jörg Daubert, Max Mühlhäuser
In: 2017 International Conference on Networked Systems (NetSys), p. 1-8, March 2017
IEEE
[Online-Edition: http://ieeexplore.ieee.org/document/7903958/]
[Inproceedings]

Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?

Tim Grube, Sascha Hauke, Jörg Daubert, Max Mühlhäuser
In: (to appear) Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference (CCNC), p. 1-4, January 2017
IEEE
[Inproceedings]

Theses

3 Entries found


Source Protection in P2P Publish/Subscribe

Bachelor Thesis, Master Thesis

finished


Many of todays communication scenarios follow the many-to-many message dissemination structure. Publish/subscribe is a distributed programming pattern for such message dissemination.

Anonymous publish/subscribe protects anonymity of senders and receivers, i.e., senders don't know receivers, receivers don't know senders, and brokers don't know both. Furthermore, anonymous publish/subscribe should not only protects against such malicious insiders, but against global NSA-like attackers as well.

Our construction for anonymous publish/subscribe uses attribute-based P2P overlay networks to protect receiver anonymity. However, protection for senders is still missing.

30.09.2015

Anonymous intra-overlay optimization

Master Thesis

finished


Publisher Subscriber or Pub/Sub pattern provides decoupling, scalability, efficiency. However, privacy is a subject that still needs to be dealt with when we consider such systems. In order to ensure privacy we need to look into the anonymity and confidentiality of such systems. Inherently, such communication or design patterns overlook the need for privacy.

Off-late there has been an increasing impetus on security and building systems keeping additional goals of anonymity, confidentiality in mind during inception itself rather than imposing it on the system after developing it. We aim for such an implementation which inherently provides and guarantees anonymity without effecting system performance.

 

Aspect Under consideration: Churn is measured as the rate at which nodes leave and join the system. Churning should not effect the reliability and availability of a system. There are several suggested ways to handle churn. However, still such systems are susceptible to churn. Information about other nodes helps upto a good extinct in normal pubsub to restructure and balance the communication overlays. In order to safeguard anonymity our system will not provide detailed node data. Addressing this issue and looking for alternatives such that Anonymity is preserved and Anonymous PubSub is efficiently able to handle churn is the research direction which is our primary area of focus. 

30.09.2015

Efficient anonymous knowledge distribution

Master Thesis

finished


In a pub/sub system, each node has a specific role, publishers produce information, subscribers consume the information and broker forwards the information generated by the producer to the consumer. Broker nodes have the information cor- responding to the identity of the publisher and the subscriber nodes. An attacker needs to attack only these broker nodes and can get information about publisher-subscriber relationship. In order to establish the relationship between publisher and subscribers, a routing table needs to be maintained and distributed. This process should preserve confidentiality and anonymity of receivers /senders while minimizing message overhead. 


Recent Activities

TPC / Chair / Organizer:

  • ARES 2017 (TPC)
  • SECUREWARE 2017 (TPC)
  • CCNC 2016 (Session Chair)

(External) Reviewer:

  • IEEE Journal on Selected Areas in Communications
  • Elsevier Information Systems
  • IEEE INFOCOM
  • IEEE Global Communications Conference
  • IEEE ICC
  • IDnext OID

Teaching

Winter Term 2017/2018

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer

Summer Term 2017

  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on trust & privacy
  • Seminar Telecooperation
    topic advisor

Winter Term 2016/2017

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer
  • Seminar Telecooperation
    topic advisor

Summer Term 2016

  • Computer Netzwerke und verteilte Systeme (CNuvS)
    co-organizer, exercise lecturer
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy
  • Bachelorpraktikum
    topic advisor "AMIS"
  • Seminar Telecooperation
    topic advisor

Winter Term 2015/2016

  • Seminar Telecooperation
    topic advisor
  • Forschungsprojekt TK
    topic advisor "AMIS"

Summer Term 2015

  • Seminar Telecooperation
    topic advisor
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy

Winter Term 2014/2015

  • Smart Cities Seminar
    Organizer
  • Seminar Telecooperation
    Co-organizer, topic advisor

Summer Term 2014

  • Resilient Networks
    lecturer (one session)

Summer Term 2013

  • Seminar Telekooperation (course web page)
    Advisor for topics "Location-based privacy enhancing technologies", and "(Social) graph privacy"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Twitterize - Anonymize Twitter"

Summer Term 2012

  • Seminar Telekooperation
    Advisor for topics "Privacy in wireless sensor networks", "Comparison: Privacy policy languages", "A brief survey on three PPDM techniques", and "Private P2P communities"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Privacy for da_sense"

Winter Term 2011/2012

  • Seminar Telekooperation
    Advisor for topics "Anonymity metrics", "Anonymity and misbehavior", and "Timing attacks on TOR"
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang