Research profile

Under the term "Decentralized Systems and Network Services" we understand distributed and networked technical systems that span over more than one administrative domain. Hence, their operation depends on more than one party. The current focus of our group is on

  • Blockchains, broadcast and consensus algorithms and smart contracts
  • P2P-networks and Network Monitoring
  • Decentralized Messaging at the example of Matrix
  • Identity Management and Access Control Systems
  • Secure and privacy-aware computing in partially trustworthy environments.

We have has also contributed research for many years in the fields of mobility (connected vehicles, "Car-to-X Communication"), decentral energy systems, and federative identity managment.

Our group designs and analyses techniques with the particular focus on security, performance, and deployability:

  • Security: explicit modelling of trust and "tunable security"
  • Performance: performance evaluation through discrete event modelling and simulation
  • Deployability: deployability is part of the requirement and evaluation
Current Publications
Title Author Source

The Third IEEE International Conference on Blockchain Computing and Applications (BCCA 2021)

IEEE Access, New York, USA

4th International Workshop on Cryptocurrencies and Blockchain Technology (CBT'20)

SACMAT '20: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, Barcelona Spain, June, 2020. Ed.: J. Lobo

Conference on Communications and Network Security (CNS 2020), Avignon, Frankreich

Research areas

Security and Anonymity of Blockchain Networks

  • Monitoring and experiments in the Bitcoin p2p network: dsn.tm.kit.edu/bitcoin
  • Development of simulation models for simulation of the Bitcoin p2p network
  • Evaluation of security and performance

Crypto Currencies and Consensus

  • Global consensus
  • Payment channels and other off-chain techniques
  • Game theoretic constructions for security

Modelling of Decentralized Trust

  • Trusted execution environments
  • Identity and key management
  • Privacy and data protection

Network Security Monitoring

  • Deployability
  • Evaluation of performance
  • Threat intelligence management

Simulation and Methods for Simulation

  • Development of complex models for simulation
  • Analysis of models for simulation
  • Simulation methods and optimization

Funded Research Projects

As a research group, we are and were involved in several projects on research, standardisation, and integration. Listed below is an overview of current and finished projects that we are or were a part of.

Finished Projects
Title Contact

Jérôme Härri