Home | deutsch  | Legals | Data Protection | Sitemap | KIT

Research profile

Under the term "Decentralized Systems and Network Services" we understand distributed and networked technical systems that span over more than one administrative domain. Hence, their operation depends on more than one party. The current focus of our group is on

  • Blockchains, consensus and peer-to-peer networks
  • Network Security Monitoring
  • Secure and privacy-aware computing in partially trustworthy environments.

We have has also contributed research for many years in the fields of mobility (connected vehicles, "Car-to-X Communication"), decentral energy systems, and federative identity managment.

Our group designs and analyses techniques with the particular focus on security, performance, and deployability:

  • Security: explicit modelling of trust and "tunable security"
  • Performance: performance evaluation through discrete event modelling and simulation (esp. parallel simulation)
  • Deployability: deployability is part of the requirement and evaluation
Artikel
Titel Autor Quelle

Financial Cryptography and Data Security 2018, Curaçao, March 2018

5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 2018, Curaçao, March 2018

INFORMATIK 2017. Chemnitz. September 2017

Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS), Singapore, May 2017

4th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 2017, Sliema, Malta, April 2017



Research areas

Security and Anonymity of Blockchain Networks

  • Monitoring and experiments in the Bitcoin p2p network: dsn.tm.kit.edu/bitcoin
  • Development of simulation models for simulation of the Bitcoin p2p network
  • Evaluation of security and performance

Crypto Currencies and Consensus

  • Global consensus
  • Payment channels and other off-chain techniques
  • Game theoretic constructions for security

Modelling of Decentralized Trust

  • Trusted execution environments
  • Identity and key management
  • Privacy and data protection

Network Security Monitoring

  • Deployability
  • Evaluation of performance
  • Threat intelligence management

Simulation and Methods for Simulation

  • Development of complex models for simulation
  • Analysis of models for simulation
  • Simulation methods and optimization

Funded Research Projects

As a research group, we are and were involved in several projects on research, standardisation, and integration. Listed below is an overview of current and finished projects that we are or were a part of.

Current Projects
Title Contact


Finished Projects
Title Contact

Jérôme Härri