{"id":"https://openalex.org/W4415398515","doi":"https://doi.org/10.1109/etfa65518.2025.11205609","title":"Time-Limited Software Firewall Based on DPDK Supporting TSN and DetNet Traffic","display_name":"Time-Limited Software Firewall Based on DPDK Supporting TSN and DetNet Traffic","publication_year":2025,"publication_date":"2025-09-09","ids":{"openalex":"https://openalex.org/W4415398515","doi":"https://doi.org/10.1109/etfa65518.2025.11205609"},"language":null,"primary_location":{"id":"doi:10.1109/etfa65518.2025.11205609","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa65518.2025.11205609","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106548823","display_name":"Lukas Bechtel","orcid":"https://orcid.org/0000-0003-2635-8572"},"institutions":[{"id":"https://openalex.org/I134656947","display_name":"Esslingen University of Applied Sciences","ror":"https://ror.org/056cezx90","country_code":"DE","type":"education","lineage":["https://openalex.org/I134656947"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Lukas Bechtel","raw_affiliation_strings":["University of Applied Sciences,Esslingen,Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences,Esslingen,Germany","institution_ids":["https://openalex.org/I134656947"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001830480","display_name":"Markus A. Schramm","orcid":"https://orcid.org/0000-0003-3513-3842"},"institutions":[{"id":"https://openalex.org/I134656947","display_name":"Esslingen University of Applied Sciences","ror":"https://ror.org/056cezx90","country_code":"DE","type":"education","lineage":["https://openalex.org/I134656947"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus Schramm","raw_affiliation_strings":["University of Applied Sciences,Esslingen,Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences,Esslingen,Germany","institution_ids":["https://openalex.org/I134656947"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066802567","display_name":"Michael Menth","orcid":"https://orcid.org/0000-0002-3216-1015"},"institutions":[{"id":"https://openalex.org/I8087733","display_name":"University of T\u00fcbingen","ror":"https://ror.org/03a1kwz48","country_code":"DE","type":"education","lineage":["https://openalex.org/I8087733"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Menth","raw_affiliation_strings":["University of Tuebingen,Chair of Communication Networks,Germany"],"affiliations":[{"raw_affiliation_string":"University of Tuebingen,Chair of Communication Networks,Germany","institution_ids":["https://openalex.org/I8087733"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065269908","display_name":"Tobias Heer","orcid":"https://orcid.org/0000-0003-3119-252X"},"institutions":[{"id":"https://openalex.org/I134656947","display_name":"Esslingen University of Applied Sciences","ror":"https://ror.org/056cezx90","country_code":"DE","type":"education","lineage":["https://openalex.org/I134656947"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tobias Heer","raw_affiliation_strings":["University of Applied Sciences,Esslingen,Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences,Esslingen,Germany","institution_ids":["https://openalex.org/I134656947"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5106548823"],"corresponding_institution_ids":["https://openalex.org/I134656947"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34761008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9523000121116638,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.7886999845504761},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.5764999985694885},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.5468999743461609},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4918000102043152},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.49140000343322754},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4715999960899353}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.7886999845504761},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7519000172615051},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.5764999985694885},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.5468999743461609},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4918000102043152},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.49140000343322754},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48089998960494995},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4715999960899353},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3343000113964081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3212999999523163},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2671999931335449},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa65518.2025.11205609","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa65518.2025.11205609","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,100],"convergence":[1],"of":[2],"IT":[3],"and":[4,10,20,93,111],"OT":[5],"networks":[6],"introduces":[7],"strict":[8],"latency":[9,104],"security":[11,63,114],"requirements,":[12],"especially":[13],"in":[14,88],"virtualized":[15],"industrial":[16],"environments.":[17],"While":[18],"TSN":[19],"DetNet":[21],"provide":[22],"bounded-latency":[23],"traffic":[24],"delivery,":[25],"traditional":[26],"software":[27,90],"firewalls":[28],"break":[29],"determinism":[30],"due":[31],"to":[32,50],"variable":[33],"rule":[34,47,66],"evaluation":[35,48],"times.":[36],"Hence,":[37],"we":[38,68],"propose":[39,69],"a":[40,51,71,89],"time-limited":[41],"firewall":[42,91],"design":[43,87],"that":[44,70],"limits":[45],"per-packet":[46],"time":[49],"fixed":[52],"budget,":[53],"ensuring":[54],"deterministic":[55],"processing":[56],"even":[57],"under":[58,96],"high":[59,109],"load.":[60],"To":[61],"preserve":[62],"despite":[64],"partial":[65],"checks,":[67],"deferred":[72],"filtering":[73],"stage":[74],"verifies":[75],"and,":[76],"if":[77],"necessary,":[78],"retroactively":[79],"corrects":[80],"earlier":[81],"forwarding":[82],"decisions.":[83],"We":[84],"implement":[85],"this":[86],"prototype":[92],"evaluate":[94],"it":[95],"maximum":[97],"packet":[98],"rate.":[99],"system":[101],"guarantees":[102],"limited":[103],"for":[105],"all":[106,116],"packets,":[107],"maintains":[108],"throughput,":[110],"ensures":[112],"eventual":[113],"consistency,":[115],"without":[117],"requiring":[118],"specialized":[119],"hardware.":[120]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-22T00:00:00"}
