2022
[78]OpenSky Report 2022: Evaluating Aviation Emissions Using Crowdsourced Open Flight Data (Junzi Sun, Luis Basora, Xavier Olive, Martin Strohmeier, Matthias Schäfer, Ivan Martinovic, Vincent Lenders), In 2022 IEEE/AIAA 41st Digital Avionics Systems Conference (DASC), 2022. [bibtex] [doi]
2021
[77]OpenSky Report 2021: Insights on ADS-B Mandate and Fleet Deployment in Times of Crisis (Junzi Sun, Xavier Olive, Martin Strohmeier, Matthias Schäfer, Ivan Martinovic, Vincent Lenders), In 2021 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 2021. [bibtex]
2020
[76]OpenSky Report 2020: Analysing in-flight emergencies using big data (Xavier Olive, Axel Tanner, Martin Strohmeier, Matthias Schäfer, Metin Feridun, Allan Tart, Ivan Martinovic, Vincent Lenders), In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 2020. [bibtex] [doi]
2019
[75] OpenSky Report 2019: Analysing TCAS in the Real World using Big Data (Matthias Schäfer, Xavier Olive, Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic), In IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 2019. [bibtex] [pdf]
[74] On the Applicability of Satellite-based Air Traffic Control Communication for Security (Martin Strohmeier, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic), In IEEE Communications Magazine, volume 57, 2019. [bibtex] [pdf]
2018
[73] OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data (Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Vincent Lenders, Ivan Martinovic), In Digital Avionics Systems Conference (DASC), 2018 IEEE/AIAA 37th, 2018. [bibtex] [pdf]
[72] Utilizing air traffic communications for OSINT on state and government aircraft (Martin Strohmeier, Matt Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic), In 10th International Conference on Cyber Conflict (CyCon), 2018. [bibtex] [pdf]
[71] Surveying Aviation Professionals on the Security of the Air Traffic Control System (Martin Strohmeier, Anna K. Niedbala, Matthias Schäfer, Vincent, Lenders, Ivan Martinovic), In International Workshop on Cyber Security for Intelligent Transportation Systems (CSITS), 2018. [bibtex] [pdf]
2017
[70] OpenSky Report 2017: Mode S and ADS-B Usage of Military and other State Aircraft (Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Vincent Lenders, Marc Liechti, Ivan Martinovic), In IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 2017. [bibtex] [pdf]
[69] On Perception and Reality in Wireless Air Traffic Communication Security (Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic), In IEEE Transactions on Intelligent Transportation Systems, volume 18, 2017. [bibtex] [pdf]
[68] Crowdsourcing Security for Wireless Air Traffic Communications (Martin Strohmeier, Matt Smith, Matthias Schäfer, Vincent Lenders, Ivan Martinovic), In Proceedings of the 9th International Conference on Cyber Conflict (CyCon), 2017. [bibtex] [pdf]
2016
[67] On Perception and Reality in Wireless Air Traffic Communications Security (Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic), In arXiv:1602.08777 [cs.CR], 2016. [bibtex] [pdf]
[66] Assessing the Impact of Aviation Security on Cyber Power (Martin Strohmeier, Matt Smith, Matthias Schäfer, Vincent Lenders, Ivan Martinovic), In International Conference on Cyber Conflict (CyCon), 2016. [bibtex] [pdf]
[65] OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS-B Usage (Matthias Schäfer, Martin Strohmeier, Matthew Smith, Markus Fuchs, Rui Pinheiro, Vincent Lenders, Ivan Martinovic), In IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 2016. [bibtex] [pdf]
2015
[64] OpenSky: A Swiss Army Knife for Air Traffic Security Research (Martin Strohmeier, Matthias Schäfer, Markus Fuchs, Vincent Lenders, Ivan Martinovic), In IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 2015. [bibtex] [pdf]
2014
[63] Realities and Challenges of NextGen Air Traffic Management: The Case of ADS-B (Martin Strohmeier, Matthias Schäfer, Vincent Lenders, Ivan Martinovic), In IEEE Communications Magazine, volume 52, 2014. [bibtex] [pdf]
[62] Bringing Up OpenSky: A Large-scale ADS-B Sensor Network for Research (Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm), In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN '14), IEEE Press, 2014. [bibtex] [pdf]
[61] Demonstration Abstract: OpenSky: A Large-scale ADS-B Sensor Network for Research (Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm), In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN '14), IEEE Press, 2014. [bibtex] [pdf]
[60] Gaining Insight on Friendly Jamming in a Real-world IEEE 802.11 Network (Daniel S. Berger, Francesco Gringoli, Nicol`o Facchi, Ivan Martinovic, Jens Schmitt), In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, ACM, 2014. [bibtex] [pdf] [doi]
2013
[59] Neighborhood Watch: On Network Coding Throughput and Key Sharing (Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim El Defrawy, Jens Schmitt), In IEEE GLOBECOM, 2013. [bibtex] [pdf]
[58]Secure Key Generation in Sensor Networks Based on Frequency-selective Channels (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In IEEE Journal on Selected Areas in Communications, volume 31, 2013. [bibtex]
[57] Experimental Analysis of Attacks on Next Generation Air Traffic Communication (Matthias Schäfer, Vincent Lenders, Ivan Martinovic), In Applied Cryptography and Network Security (ACNS '13), Springer Berlin Heidelberg, volume 7954, 2013. [bibtex] [pdf]
[56] Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), Technical report, University of Kaiserslautern, Germany, 2013. [bibtex] [pdf]
[55] Who do you sync you are?: smartphone fingerprinting via application behaviour (Tim Stöber, Mario Frank, Jens Schmitt, Ivan Martinovic), In ACM WiSec, 2013. [bibtex] [pdf]
2012
[54] A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols (Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic), In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS '12), Springer, 2012. [bibtex] [pdf]
2011
[53] WiSec 2011 Demo: RFReact---A Real-time Capable and Channel-aware Jamming Platform (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), In SIGMOBILE Mobile Computing and Communications Review, ACM, volume 15, 2011. [bibtex] [pdf] [doi]
[52] WiFire: A Firewall for Wireless Networks (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), In Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '11), ACM, 2011. [bibtex] [pdf]
[51] Reactive Jamming in Wireless Networks: How Realistic is the Threat? (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), In Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11), ACM, 2011. [bibtex] [pdf]
[50] Pay Bursts Only Once Holds for (Some) Non-FIFO Systems (Jens Schmitt, Nicos Gollan, Steffen Bondorf, Ivan Martinovic), In The 30th IEEE International Conference on Computer Communications (INFOCOM 2011), 2011. [bibtex] [pdf] [doi]
[49] Dynamic Demultiplexing in Network Calculus -- Theory and Application (Hao Wang, Jens Schmitt, Ivan Martinovic), In Performance Evaluation, Elsevier, volume 68, 2011. [bibtex] [pdf]
2010
[48]Analysis of Transmission Properties in an Indoor Wireless Sensor Network Based on a Full-Factorial Design (Dennis Christmann, Ivan Martinovic, Jens Schmitt), In Special Issue on Wireless Sensor Networks - Designing for Real-world Deployment and Deployment Experiences, Measurement Science and Technology, Institute of Physics, volume 21, 2010. [bibtex]
[47]AmICA - A flexible, compact, easy-to-program, and low-power WSN platform (Sebastian Wille, Norbert Wehn, Ivan Martinovic, Simon Kunz, Peter Göhner), In Proceedings of 7th International Conference on Mobile and Ubiquitous Systems (Mobiquitous), Springer Verlag, 2010. [bibtex]
[46]AmbiSec: Securing Smart Spaces Using Entropy Harvesting (Paolo Barsocchi, Stefano Chessa, Ivan Martinovic, Gabriele Oligeri), In Proceedings of the First International Joint Conference on Ambient Intelligence (AmI-10), Springer Verlag, 2010. [bibtex]
[45] SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors (Matthias Wilhelm, Ivan Martinovic, Ersin Uzun, Jens Schmitt), In Proceedings of the 6th Annual Workshop on Secure Network Protocols (NPSec) in conjunction with IEEE ICNP 2010, IEEE, 2010. [bibtex] [pdf]
[44] A Self-Adversarial Approach to Delay Analysis under Arbitrary Scheduling (Jens Schmitt, Hao Wang, Ivan Martinovic), In Proceedings of 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010), Springer Verlag, 2010. [bibtex] [pdf]
[43] Pay Bursts Only Once Holds for (Some) Non-FIFO Systems (Jens Schmitt, Nicos Gollan, Steffen Bondorf, Ivan Martinovic), Technical report, University of Kaiserslautern, Germany, 2010. [bibtex] [pdf]
[42]Experimental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network (Dennis Christmann, Ivan Martinovic), In Proceedings of the 6th International Workshop on Wireless Network Measurements (WiNMee), in conjunction with WiOpt 2010, IEEE Computer Society, 2010. [bibtex]
[41] Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), Technical report, ArXiv.org, 2010. [bibtex] [pdf]
[40] Secret Keys from Entangled Sensor Motes: Implementation and Analysis (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2010), ACM Press, 2010. [bibtex] [pdf]
2009
[39] Light-weight Key Generation based on Physical Properties of Wireless Channels (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In Proceedings of the 11. Kryptotag der Gesellschaft für Informatik e.V., 2009. [bibtex] [pdf]
[38]Security by Wireless or Why Play Fairer than the Attacker? (Ivan Martinovic), In Proceedings of the 5th ACM SIGCOMM Asian Internet Engineering Conference (AINTEC) 2009, ACM, invited paper, 2009. [bibtex]
[37] On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec) in conjunction with IEEE ICNP 2009, IEEE Computer Society, 2009. [bibtex] [pdf]
[36]Demultiplexing in Network Calculus - A Stochastic Scaling Approach (Jens Schmitt, Ivan Martinovic), In Proceedings of the 6th International Conference on Quantitative Evaluation of SysTems (QEST) 2009, IEEE Computer Society, 2009. [bibtex] [doi]
[35]Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks (Ivan Martinovic, Luc Cappellaro, Nicos Gollan, Jens Schmitt), In Security and Communication Networks, Special Issue on Security in Wireless Sensor Networks, Wiley, Wiley, volume 2, 2009. [bibtex]
[34] Jamming for Good: A Fresh Approach to Authentic Communication in WSNs (Ivan Martinovic, Paul Pichota, Jens Schmitt), In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2009), ACM Press, 2009. [bibtex] [pdf]
[33]Turning The Tables: Using Wireless Communication Against An Attacker (Ivan Martinovic, Jens Schmitt), In 16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, Springer Informatik Aktuell, 2009. [bibtex]
[32]A New Service Curve Model to Deal with Non-FIFO Systems (Jens Schmitt, Nicos Gollan, Ivan Martinovic), In 16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, Springer Informatik Aktuell, 2009. [bibtex]
[31]Bringing law and order to IEEE 802.11 networks -- A case for DiscoSec (Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens Schmitt), In Pervasive and Mobile Computing (PMC), Elsevier, volume 5, 2009. [bibtex]
2008
[30] Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker (Adam Bachorek, Ivan Martinovic, Jens Schmitt), In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008), 2008. [bibtex] [pdf]
[29] Firewalling Wireless Sensor Networks: Security by Wireless (Ivan Martinovic, Nicos Gollan, Jens Schmitt), In Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN): Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2008), 2008. [bibtex] [pdf]
[28]A Novel Approach for a Lightweight, Crypto-free Message Authentication in Wireless Sensor Networks (Ivan Martinovic, Jens Schmitt), In Proceedings of the 7. GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Berlin, Germany, 2008. [bibtex]
[27] End-to-End Worst-Case Analysis of Non-FIFO Systems (Jens Schmitt, Nicos Gollan, Ivan Martinovic), Technical report, University of Kaiserslautern, Germany, 2008. [bibtex] [pdf]
[26] Design, Implementation, and Performance Analysis of DiscoSec -- Service Pack for Securing WLANs (Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens Schmitt), In 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2008), 2008. (Accepted as noteworthy contribution) [bibtex] [pdf]
[25]Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once (Jens Schmitt, Frank A. Zdarsky, Ivan Martinovic), In 14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008), 2008. [bibtex]
[24] The DISCO Network Calculator (Nicos Gollan, Frank A. Zdarsky, Ivan Martinovic, Jens Schmitt), In 14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008), 2008. [bibtex] [pdf]
[23] Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless (Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, Jens Schmitt), In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), ACM Press, 2008. [bibtex] [pdf]
[22]Security in IEEE 802.11-based UMA Networks (Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Jens Schmitt), Chapter in Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Y. Zhang, L. T. Yang, J. Ma, eds.), Auerbach Publications, Taylor&Francis Group, 2008. (ISBN:1420055372.) [bibtex]
[21]Radio Resource Management in IEEE 802.11-based UMA Networks (Frank A. Zdarsky, Ivan Martinovic), Chapter in Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Y. Zhang, L. T. Yang, J. Ma, eds.), Auerbach Publications, Taylor&Francis Group, 2008. (ISBN:1420055372.) [bibtex]
2007
[20] Regional-based Authentication Against DoS Attacks in Wireless Networks (Ivan Martinovic, Frank A. Zdarsky, Jens Schmitt), In Proceedings of the 3rd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks (in conjunction with ACM/IEEE MSWiM'07), 2007. [bibtex] [pdf]
[19]Minimizing Contention through Cooperation between Densely-Deployed Wireless LANs (Frank A. Zdarsky, Ivan Martinovic, Jens Schmitt), In Wireless Networks, Springer, Springer, volume ISSN 1022-0038 (Print) 1572-8196 (Online), 2007. [bibtex]
[18] Phishing in the Wireless: Implementation and Analysis (Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens Schmitt), In Proceedings of the 22nd IFIP International Information Security Conference (SEC 2007), Johannesburg, South Africa (, ed.), Springer, volume Volume 232/2007, 2007. [bibtex] [pdf]
[17] Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks (Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Jens Schmitt), In Proceedings of the 13th European Wireless Conference (EW2007), Paris, France, 2007. [bibtex] [pdf]
2006
[16] Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff (Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Jens Schmitt), Technical report, University of Kaiserslautern, Germany, 2006. [bibtex] [pdf]
[15]Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online-Betrugs-Prävention (Invited Paper) (Ivan Martinovic, Jens Schmitt), In Deutsches Forum für Kriminalprävention (DFK) Workshop Internet-Devianz, Bonn, Germany, Deutsches Forum für Kriminalprävention, 2006. [bibtex]
[14] Phishing in the Wireless: Implementation and Analysis (Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christan Jung, Jens Schmitt), Technical report, University of Kaiserslautern, Germany, 2006. [bibtex] [pdf]
[13]On Self-coordination in Wireless Community Networks (Frank A. Zdarsky, Ivan Martinovic, Jens Schmitt), In Proceedings of the 11th IFIP International Conference on Personal Wireless Communications (PWC'06), Albacete, Spain, Springer LNCS, 2006. [bibtex]
[12] Self-Protection in P2P Networks: Choosing the Right Neighbourhood (Ivan Martinovic, Christof Leng, Frank A. Zdarsky, Andreas Mauthe, Ralf Steinmetz, Jens Schmitt), In Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany, Springer LNCS, 2006. [bibtex] [pdf]
[11]The Case for Virtualized Wireless Access Networks (Frank A. Zdarsky, Ivan Martinovic, Jens Schmitt), In Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany, Springer LNCS, 2006. [bibtex]
[10] On the Way to IEEE 802.11 DoS Resilience (Ivan Martinovic, Frank A. Zdarsky, Jens Schmitt), In Proceedings of IFIP NETWORKING 2006, Workshop on Security and Privacy in Mobile and Wireless Networking, Coimbra, Portugal, Springer LNCS, 2006. [bibtex] [pdf]
[9] Performance Bounds in Feed-Forward Networks under Blind Multiplexing (Jens Schmitt, Frank A. Zdarsky, Ivan Martinovic), Technical report, University of Kaiserslautern, Germany, 2006. [bibtex] [pdf]
2005
[8] On Lower Bounds for MAC Layer Contention in CSMA/CA-Based Wireless Networks (Frank A. Zdarsky, Ivan Martinovic, Jens Schmitt), In 3rd ACM/SIGMOBILE International Workshop on Foundations of Mobile Computing (DIALM-POMC'05), 2005. [bibtex] [pdf]
[7] Self-Coordination Mechanisms for Wireless Community Networks (Frank A. Zdarsky, Ivan Martinovic, Jens Schmitt), Technical report, University of Kaiserslautern, Germany, 2005. [bibtex] [pdf]
[6] Lower Bounds for Contention in CSMA/CA-based Wireless LANs (Frank A. Zdarsky, Ivan Martinovic, Jens Schmitt), Technical report, University of Kaiserslautern, Germany, 2005. [bibtex] [pdf]
2004
[5]Web Services zur Unterstützung flexibler Geschäftsprozesse in der Finanzwirtschaft (Ralf Steinmetz, Rainer Berbner, Ivan Martinovic), Chapter in Handbuch Industrialisierung der Finanzwirtschaft (Z. Sokolovsky, S. Löschenkohl, eds.), Gabler Verlag, 2004. (ISBN 3-409-12675-9) [bibtex]
[4]Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications (Ivan Martinovic, Manuel Goertz, Ralf Ackermann, Andreas Mauthe, Ralf Steinmetz), In Proceedings of SoftCOM'04, International Conference on Software, Telecommunications and Computer Networks, Croatia, 2004. [bibtex]
[3]A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks (Matthias Hollick, Ivan Martinovic, Tronje Krop, Ivica Rimac), In Proceedings of the 30th IEEE EUROMICRO Conference, Rennes, France, IEEE, 2004. (ISBN 0-7695-2199-1) [bibtex]
[2]Digital Heritage Application as an Edutainment Tool (Meehae Song, Thomas Elias, Ivan Martinovic, Wolfgang Müller-Wittig, Tony K.Y. Chan), In Proceedings of the ACM SIGGRAPH International Conference on Virtual Reality Continuum and its Applications in Industry, ACM Press, 2004. (ISBN 1-58113-884-9) [bibtex]
2003
[1]User-Centred Virtual Avatars in Real-time (Meehae Song, Thomas Elias, Ivan Martinovic, Wolfgang Müller-Wittig, Tony K.Y. Chan), In Proceedings of the 9th International Conference on Virtual Systems and Multimedia (VSMM 2003), Montreal, Canada, 2003. [bibtex]
Go to top