Thomas Mundt
University of Rostock
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Thomas Mundt.
Annals of Gis: Geographic Information Sciences | 2004
Ralf Bill; Clemens H. Cap; Martin Kofahl; Thomas Mundt
Abstract This paper reviews existing indoor and outdoor positioning technologies for mobile users, including GPS and its extensions, wireless communication-networks and others. Accuracy and limitations of these technologies and methods are examined in more detail. Furthermore, results of own investigations concerning Wireless LAN are presented.
international symposium on computers and communications | 2005
Thomas Mundt
In this paper we present a concept and an architecture for a location dependent digital rights management system. The solution is based on a trusted hardware which incorporates the decryption of digital data, a precise secure clock, and a GPS position receiver. A prototype is currently being developed in cooperation with a hardware manufacturer.
broadband and wireless computing, communication and applications | 2012
Thomas Mundt; Frank Krüger; Till Wollenberg
Modern buildings are often equipped with universal bus systems. The purpose of these bus systems is to control the functions of houses such as lighting, climate control, and heating. In this paper we present a case study that shows how privacy issues evolve out of an untypical utilization of those control systems. As a controversial example, we show that we are able to tell, who does not perform proper hand washing by sampling data from the control network and applying an old-fashioned Monte-Carlo simulation to the problem.
2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2011
Alireza Angabini; Nasser Yazdani; Thomas Mundt; Fatemeh Hassani
Increasing amount of data and demand to process and analyze them induces enterprises to employ alternative computing paradigms to overcome computing capacity shortages. Cloud Computing is a new emerged computing approach that promises scalability of resources, on-demand availability and pay-as-you-go economic model instead of heavy investment on IT resources. However, to decide on choosing Cloud as computing platform, all aspects such as cost and performance trade-offs should be considered. In this paper, we conduct an experimental research to discover empirical challenges of developing a data-intensive application and compare realistic costs of Cloud development versus using local servers. We also discuss our method of calculating Cloud and local resources costs, analyze obtained experimental results and different issues of exploiting Cloud for different types of applications in two major interactive and batch categories.
2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) | 2016
Thomas Mundt; Peter Wickboldt
The purpose of building automation systems is to support all house functions, such as controlling lighting, air conditioning, heating, shading, access, and hence, increase comfort, save energy and provide easier administration. Those systems are highly complex and ubiquitous as they have interfaces to many other networks and systems in a building. This increases the risk that attackers use security gaps to affect the entire infrastructure. In this paper we report about a security analysis of building automation systems.
Archive | 2008
Thomas Mundt
We present how weather forecasts estimating the solar radiation for the following days at a given location can be used to adjust the power consumption of a wireless network node. The node is powered by a solar panel which recharges a battery. We discuss two methods to adjust the configuration of the wireless node according to weather forecasts. We are using OLSR routing parameters and hardware adjustments to control the amount of energy needed. One method calculates the available energy, the other uses a naive Bayesian classifier to choose the optimal configuration.
grid and cooperative computing | 2006
Thomas Mundt
Location is part of the context of an ensemble of mobile nodes in a wireless mesh network. In this paper we present a concept and an architecture for a location aware Digital Rights Management system. This system uses signal strengths in a mobile ad-hoc or mesh network to determine the position of each node and to authenticate these position information. It enables devices to control access depending on their position. We describe algorithms, protocols, security threats, and a prototype.
international conference on industrial informatics | 2004
Thomas Mundt; Sebastian Speicher
Home entertainment components usually come with remote controls as user interfaces. When combining components from different vendors, customers end up with a zoo of remote controls at their coffee tables. Most conventional approaches aiming to solve this problem, use some kind of graphical user interface allowing the user to browse through the various functions of each device. Meanwhile, research in speech technology has reached a state where it becomes suitable for the mass market. In this paper, we present a test bed as well as the results of several tests, which we have conducted to elucidate the idea of speech control for spontaneously networked home entertainment systems. Short conclusion: ubiquitous computing and speech control complement each other very sufficiently
mobility management and wireless access | 2018
Thomas Mundt; Alexander Gladisch; Simon Rietschel; Johann Bauer; Johannes Goltz; Simeon Wiedenmann
We assess the security mechanisms defined in the LoRaWAN specification and describe own research to show, whether those security mechanisms are sufficient. For this, we explain typical attacks on radiobased networks. We further show which precautions are necessary not to undermine these measures and whether additional security measures may be necessary.
frontiers in education conference | 2016
Robin Nicolay; Thomas Mundt
This study evaluates whether ultrasound tones can be used to determine position of mobile devices in classrooms. The aim is to use this position to find the seating scheme of students for another study in the area of e-learning. We have conducted several experiments to test mobile devices for their suitability. We have also performed experiments in real scenarios and implemented a software system that for position determination. We measure distances and apply the least-square algorithm to calculate the position of mobile devices.