Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: HMD Praxis der Wirtschaftsinformatik 2/2021

08-07-2020 | Spektrum

IoT Security Best Practices

Vorstellung eines Sicherheits- und Authentifizierungskonzepts bei der Realisierung von (Industrial) Internet of Things (IIoT)-Anwendungen – Eine Fallstudie zur Clientseitigen-Authentifizierung im IoT

Author: Marco Barenkamp

Published in: HMD Praxis der Wirtschaftsinformatik | Issue 2/2021

Login to get access
share
SHARE

Zusammenfassung

Der Artikel gibt einen Überblick über Best-Practice-Standards zur Authentifizierung von IoT (Internet of Things) Zugängen. Es wird aufgezeigt, dass clientseitige Authentifizierung gegenüber einer herkömmlichen Authentifizierung und Blockchain-basierten Ansätzen das höchste Potential für sichere Prozessautomatisierung bei hoher Interaktionsfrequenz bietet.
Ein neuartiges Konzept des clientseitigen automatisierten Zugangsmanagements auf Basis von TLS (transport layer security), welches sich im Agriculture Segment seit über einem Jahr bewährt hat, wird vorgestellt. Gegenüber derzeitig eingesetzten Authentifizierungsverfahren bietet es den Vorteil höherer Sicherheit bei gleichzeitig automatisierter Anmeldung jeglicher Endgeräte auf dem IoT-Server. Aufgrund dieser Potentiale eignet sich der dargestellte Authentifizierungsstandard zukünftig als allgemeines branchenübergreifendes Zugangssystem für IoT-Anwendungen.
Literature
go back to reference Amann B, Vallentin M, Hall S, Sommer R (2012) Revisiting SSL: a large-scale study of the internet’s most trusted protocol. Tech. rep., TR-12-015, ICSI Dec. 2012 Amann B, Vallentin M, Hall S, Sommer R (2012) Revisiting SSL: a large-scale study of the internet’s most trusted protocol. Tech. rep., TR-12-015, ICSI Dec. 2012
go back to reference Angelova N, Kiryakova G, Yordanova L (2017) The great impact of internet of things on business. Trakia J Sci 15(1):406–412 Angelova N, Kiryakova G, Yordanova L (2017) The great impact of internet of things on business. Trakia J Sci 15(1):406–412
go back to reference Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805 MATH Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805 MATH
go back to reference Badra M, Hajjeh I (2006) Key-exchange authentication using shared secrets. Computer 39(3):58–66 Badra M, Hajjeh I (2006) Key-exchange authentication using shared secrets. Computer 39(3):58–66
go back to reference Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949 Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949
go back to reference Biddle R, Van Oorschot PC, Patrick AS, Sobey J, Whalen T (2009) Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM workshop on Cloud computing security, S 19–30 Biddle R, Van Oorschot PC, Patrick AS, Sobey J, Whalen T (2009) Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM workshop on Cloud computing security, S 19–30
go back to reference Brewster C, Roussaki I, Kalatzis N, Doolin K, Ellis K (2017) IoT in agriculture: designing a Europe-wide large-scale pilot. IEEE Commun Mag 55(9):26–33 Brewster C, Roussaki I, Kalatzis N, Doolin K, Ellis K (2017) IoT in agriculture: designing a Europe-wide large-scale pilot. IEEE Commun Mag 55(9):26–33
go back to reference Camps-Mur D, Garcia-Villegas E, Lopez-Aguilera E, Loureiro P, Lambert P, Raissinia A (2015) Enabling always on service discovery: Wifi neighbor awareness networking. Ieee Wirel Commun 22(2):118–125 Camps-Mur D, Garcia-Villegas E, Lopez-Aguilera E, Loureiro P, Lambert P, Raissinia A (2015) Enabling always on service discovery: Wifi neighbor awareness networking. Ieee Wirel Commun 22(2):118–125
go back to reference Chadwick DW (2002) Internet X. 509 public key infrastructure operational protocols. LDAPv3 Chadwick DW (2002) Internet X. 509 public key infrastructure operational protocols. LDAPv3
go back to reference Chung T, Liu Y, Choffnes D, Levin D, Maggs BM, Mislove A, Wilson C (2016) Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the 2016 Internet Measurement Conference, S 527–541 Chung T, Liu Y, Choffnes D, Levin D, Maggs BM, Mislove A, Wilson C (2016) Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the 2016 Internet Measurement Conference, S 527–541
go back to reference Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk WT (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC, Bd. 5280, S 1–151 Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk WT (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC, Bd. 5280, S 1–151
go back to reference Erguler I (2015) A potential weakness in RFID-based Internet-of-things systems. Pervasive Mob Comput 20:115–126 Erguler I (2015) A potential weakness in RFID-based Internet-of-things systems. Pervasive Mob Comput 20:115–126
go back to reference Farrell S, Kahan J (2005) Using the XML key management specification (and breaking x. 509 rules as you go). In: IFIP International Conference on Communications and Multimedia Security. Springer, Berlin, Heidelberg, S 348–357 Farrell S, Kahan J (2005) Using the XML key management specification (and breaking x. 509 rules as you go). In: IFIP International Conference on Communications and Multimedia Security. Springer, Berlin, Heidelberg, S 348–357
go back to reference Ferrández-Pastor FJ, García-Chamizo JM, Nieto-Hidalgo M, Mora-Pascual J, Mora-Martínez J (2016) Developing ubiquitous sensor network platform using internet of things: application in precision agriculture. Sensors 16(7):1141 Ferrández-Pastor FJ, García-Chamizo JM, Nieto-Hidalgo M, Mora-Pascual J, Mora-Martínez J (2016) Developing ubiquitous sensor network platform using internet of things: application in precision agriculture. Sensors 16(7):1141
go back to reference Gansemer S, Sell J, Schulz S, Horster B, Horster-Möller T, Rusch C, Eren E et al (2014) Machine-to-machine communication for process optimization in agriculture. In: 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems. Offenburg, 2014. IEEE, S 48–54. https://​doi.​org/​10.​1109/​IDAACS-SWS.​2014.​6954622 Gansemer S, Sell J, Schulz S, Horster B, Horster-Möller T, Rusch C, Eren E et al (2014) Machine-to-machine communication for process optimization in agriculture. In: 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems. Offenburg, 2014. IEEE, S 48–54. https://​doi.​org/​10.​1109/​IDAACS-SWS.​2014.​6954622
go back to reference Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V (2012) The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM conference on Computer and communications security, S 38–49 Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V (2012) The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM conference on Computer and communications security, S 38–49
go back to reference Gupta H (2019) Onboarding and software update architecture for IoT devices. Masterthesis Gupta H (2019) Onboarding and software update architecture for IoT devices. Masterthesis
go back to reference Koutanov E (2020) Effective Kafka. A hand-on guide to building robust and scalable event-driven applications with code examples in Java Koutanov E (2020) Effective Kafka. A hand-on guide to building robust and scalable event-driven applications with code examples in Java
go back to reference Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In: Proceedings of the 2014 IEEE International Symposium on Next-Generation Electronics Kwei-Shan, Taiwan, 7–10 May 2014, S 1–2 Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In: Proceedings of the 2014 IEEE International Symposium on Next-Generation Electronics Kwei-Shan, Taiwan, 7–10 May 2014, S 1–2
go back to reference Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Future Gener Comput Syst 86:641–649 Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Future Gener Comput Syst 86:641–649
go back to reference Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259 Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259
go back to reference Lu RJ, Liu ZG, Zheng XH (2006) United Authentication Platform Based on HTTPS Tunnel Technology. Appl Res Comp 2006(12):168–170 Lu RJ, Liu ZG, Zheng XH (2006) United Authentication Platform Based on HTTPS Tunnel Technology. Appl Res Comp 2006(12):168–170
go back to reference Mayer CP (2009) Security and privacy challenges in the internet of things. In: Electronic Communications of the EASST, Bd. 17 Mayer CP (2009) Security and privacy challenges in the internet of things. In: Electronic Communications of the EASST, Bd. 17
go back to reference Mendez DM, Papapanagiotou I, Yang B (2017) Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879 Mendez DM, Papapanagiotou I, Yang B (2017) Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879
go back to reference Miettinen M, van Oorschot PC, Sadeghi AR (2018) Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. arXiv preprint arXiv:1808.03071 Miettinen M, van Oorschot PC, Sadeghi AR (2018) Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. arXiv preprint arXiv:1808.03071
go back to reference Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Procedia Comput Sci 93:931–939 Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Procedia Comput Sci 93:931–939
go back to reference Nash E, Korduan P, Bill R (2009) Applications of open geospatial web services in precision agriculture: a review. Precis Agric 10(6):546 Nash E, Korduan P, Bill R (2009) Applications of open geospatial web services in precision agriculture: a review. Precis Agric 10(6):546
go back to reference Ojha T, Misra S, Raghuwanshi NS (2015) Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput Electron Agric 118:66–84 Ojha T, Misra S, Raghuwanshi NS (2015) Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput Electron Agric 118:66–84
go back to reference Oksanen T, Linkolehto R, Seilonen I (2016) Adapting an industrial automation protocol to remote monitoring of mobile agricultural machinery: a combine harvester with IoT. IFAC-PapersOnLine 49(16):127–131 Oksanen T, Linkolehto R, Seilonen I (2016) Adapting an industrial automation protocol to remote monitoring of mobile agricultural machinery: a combine harvester with IoT. IFAC-PapersOnLine 49(16):127–131
go back to reference Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, S 523–533 Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, S 523–533
go back to reference Patil VC, Al-Gaadi KA, Biradar DP, Rangaswamy M (2012) Internet of things (Iot) and cloud computing for agriculture: an overview. In: Proceedings of agro-informatics and precision agriculture AIPA 2012, India, S 292–296 Patil VC, Al-Gaadi KA, Biradar DP, Rangaswamy M (2012) Internet of things (Iot) and cloud computing for agriculture: an overview. In: Proceedings of agro-informatics and precision agriculture AIPA 2012, India, S 292–296
go back to reference Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019a) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: 9th International Conference on Model and Data Engineering, MEDI 2019, Toulouse, France, 2019. Lecture notes in computer science, Bd 11815. Springer, S 172 Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019a) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: 9th International Conference on Model and Data Engineering, MEDI 2019, Toulouse, France, 2019. Lecture notes in computer science, Bd 11815. Springer, S 172
go back to reference Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019b) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: International Conference on Model and Data Engineering. Springer, Cham, S 172–183 Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019b) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: International Conference on Model and Data Engineering. Springer, Cham, S 172–183
go back to reference Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE Wireless Communications and Networking Conference WCNC, Istanbul, 2014, IEEE, S 2728–2733 Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE Wireless Communications and Networking Conference WCNC, Istanbul, 2014, IEEE, S 2728–2733
go back to reference Potamitis I, Eliopoulos P, Rigakis I (2017) Automated remote insect surveillance at a global scale and the internet of things. Robotics 6(3):19 Potamitis I, Eliopoulos P, Rigakis I (2017) Automated remote insect surveillance at a global scale and the internet of things. Robotics 6(3):19
go back to reference Saloni S, Hegde A (2016) WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: enabling new proximity based services. In: 2016 International Conference on Internet of Things and Applications IOTA, Pune, India, 2016, IEEE, S 137–142 Saloni S, Hegde A (2016) WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: enabling new proximity based services. In: 2016 International Conference on Internet of Things and Applications IOTA, Pune, India, 2016, IEEE, S 137–142
go back to reference Schmeh K (2016) Kryptografie: Verfahren, Protokolle, Infrastrukturen. dpunkt.verlag, Heidelberg MATH Schmeh K (2016) Kryptografie: Verfahren, Protokolle, Infrastrukturen. dpunkt.verlag, Heidelberg MATH
go back to reference Shacham H, Boneh D (2001) Improving SSL handshake performance via batching. In: Cryptographers’ track at the RSA Conference. Springer, Berlin, Heidelberg, S 28–43 Shacham H, Boneh D (2001) Improving SSL handshake performance via batching. In: Cryptographers’ track at the RSA Conference. Springer, Berlin, Heidelberg, S 28–43
go back to reference Shen J, Chang S, Shen J, Liu Q, Sun X (2018) A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener Comput Syst 78:956–963 Shen J, Chang S, Shen J, Liu Q, Sun X (2018) A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener Comput Syst 78:956–963
go back to reference Shenoy J, Pingle Y (2016) IOT in agriculture. In: 2016 3rd International Conference on Computing for Sustainable Global Development INDIACom, New Delhi, 2016. IEEE, S 1456–1458 Shenoy J, Pingle Y (2016) IOT in agriculture. In: 2016 3rd International Conference on Computing for Sustainable Global Development INDIACom, New Delhi, 2016. IEEE, S 1456–1458
go back to reference Shi X, An X, Zhao Q, Liu H, Xia L, Sun X, Guo Y (2019) State-of-the-art internet of things in protected agriculture. Sensors 19(8):1833 Shi X, An X, Zhao Q, Liu H, Xia L, Sun X, Guo Y (2019) State-of-the-art internet of things in protected agriculture. Sensors 19(8):1833
go back to reference Shin S, Kobara K (2016) A security framework for MQTT. In: 2016 IEEE Conference on Communications and Network Security CNS, S 432–436 Shin S, Kobara K (2016) A security framework for MQTT. In: 2016 IEEE Conference on Communications and Network Security CNS, S 432–436
go back to reference Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164 Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164
go back to reference Sodiya AS, Folorunso O, Komolafe PB, Ogunderu OP (2011) Preventing authentication systems from keylogging attack. J Inf Priv Secur 7(2):3–27 Sodiya AS, Folorunso O, Komolafe PB, Ogunderu OP (2011) Preventing authentication systems from keylogging attack. J Inf Priv Secur 7(2):3–27
go back to reference Soltani R, Nguyen UT, An A (2018) A new approach to client onboarding using self-sovereign identity and distributed ledger. Paper presented at the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018. IEEE, S 1129–1136. https://​doi.​org/​10.​1109/​Cybermatics_​2018.​2018.​00205 Soltani R, Nguyen UT, An A (2018) A new approach to client onboarding using self-sovereign identity and distributed ledger. Paper presented at the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018. IEEE, S 1129–1136. https://​doi.​org/​10.​1109/​Cybermatics_​2018.​2018.​00205
go back to reference Sonare S, Mishra A, Verma A (2012) An authentication mechanism based on Client-Server architecture for accessing Cloud Computing. Int J Emerging Technol Adv Eng 2(7):2250–2459 Sonare S, Mishra A, Verma A (2012) An authentication mechanism based on Client-Server architecture for accessing Cloud Computing. Int J Emerging Technol Adv Eng 2(7):2250–2459
go back to reference Stočes M, Vaněk J, Masner J, Pavlík J (2016) Internet of things (iot) in agriculture-selected aspects. Agris On-line Pap Econ Inform 8(665-2016-45107):83–88 Stočes M, Vaněk J, Masner J, Pavlík J (2016) Internet of things (iot) in agriculture-selected aspects. Agris On-line Pap Econ Inform 8(665-2016-45107):83–88
go back to reference Sukhwani H, Martínez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th Symposium on Reliable Distributed Systems SRDS. Hong Kong. IEEE, S 253–255 Sukhwani H, Martínez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th Symposium on Reliable Distributed Systems SRDS. Hong Kong. IEEE, S 253–255
go back to reference Tasca P, Tessone CJ (2017) Taxonomy of blockchain technologies. Principles of identification and classification. arXiv preprint arXiv:1708.04872 Tasca P, Tessone CJ (2017) Taxonomy of blockchain technologies. Principles of identification and classification. arXiv preprint arXiv:1708.04872
go back to reference Wagner D, Schneier B (1996) Analysis of the SSL 3.0 protocol. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Bd. 1, No. 1, S 29–40 Wagner D, Schneier B (1996) Analysis of the SSL 3.0 protocol. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Bd. 1, No. 1, S 29–40
go back to reference Weber RH (2009) Internet of things—need for a new legal environment? Comput Law Secur Rev 25(6):522–527 Weber RH (2009) Internet of things—need for a new legal environment? Comput Law Secur Rev 25(6):522–527
go back to reference Weber RH (2010) Internet of things—new security and privacy challenges. Comput Law Secur Rev 26(1):23–30 Weber RH (2010) Internet of things—new security and privacy challenges. Comput Law Secur Rev 26(1):23–30
go back to reference Weißbach M, Taing N, Wutzler M, Springer T, Schill A, Clarke S (2016) Decentralized coordination of dynamic software updates in the Internet of Things. In: 2016 IEEE 3rdWorld Forum on Internet of Things WF-IoT, S 171–176 Weißbach M, Taing N, Wutzler M, Springer T, Schill A, Clarke S (2016) Decentralized coordination of dynamic software updates in the Internet of Things. In: 2016 IEEE 3rdWorld Forum on Internet of Things WF-IoT, S 171–176
go back to reference Woodbury C, Botz P (2004) Experts’ guide to OS/400 & I5/OS security. System iNetwork, 29th Street Press Woodbury C, Botz P (2004) Experts’ guide to OS/400 & I5/OS security. System iNetwork, 29th Street Press
go back to reference Yewale AJ (2018) Study of Blockchain-as-a-Service Systems with a Case Study of Hyperledger Fabric Implementation on Kubernetes Yewale AJ (2018) Study of Blockchain-as-a-Service Systems with a Case Study of Hyperledger Fabric Implementation on Kubernetes
go back to reference Zhao K, Ge L (2013) A survey on the internet of things security. Paper presented at the 2013 Ninth International Conference on Computational Intelligence and Security, S. 663–667 Zhao K, Ge L (2013) A survey on the internet of things security. Paper presented at the 2013 Ninth International Conference on Computational Intelligence and Security, S. 663–667
go back to reference Zyskind G, Nathan O, Pentland A (2015) Decentralizing Privacy: Using Blockchain to Protect Personal Data. Paper presented at the 2015 IEEE Security and Privacy Workshops, S 180–184 Zyskind G, Nathan O, Pentland A (2015) Decentralizing Privacy: Using Blockchain to Protect Personal Data. Paper presented at the 2015 IEEE Security and Privacy Workshops, S 180–184
Metadata
Title
IoT Security Best Practices
Vorstellung eines Sicherheits- und Authentifizierungskonzepts bei der Realisierung von (Industrial) Internet of Things (IIoT)-Anwendungen – Eine Fallstudie zur Clientseitigen-Authentifizierung im IoT
Author
Marco Barenkamp
Publication date
08-07-2020
Publisher
Springer Fachmedien Wiesbaden
Published in
HMD Praxis der Wirtschaftsinformatik / Issue 2/2021
Print ISSN: 1436-3011
Electronic ISSN: 2198-2775
DOI
https://doi.org/10.1365/s40702-020-00637-4

Other articles of this Issue 2/2021

HMD Praxis der Wirtschaftsinformatik 2/2021 Go to the issue

Premium Partner