This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-23 Creation time: 10-10-09 --- Number of references 62 techreport draft-irtf-coinrg-use-cases-02 Use Cases for In-Network Computing 2022 3 draft-irtf-coinrg-use-cases-02 expires: 8 September 2022 (work in progress) https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/ Online IETF Trust Internet Drafts Internet Engineering Task Force Internet Engineering Task Force IkeKunze KlausWehrle DirkTrossen Marie-JoséMontpetit Xavierde Foy DavidGriffin MiguelRio techreport draft-kunze-coinrg-transport-issues-05 Transport Protocol Issues of In-Network Computing Systems 2021 10 draft-kunze-coinrg-transport-issues-05 Expires: 28 April 2022 (work in progress) https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-kunze-coinrg-transport-issues-05.pdf https://datatracker.ietf.org/doc/draft-kunze-coinrg-transport-issues/ IETF Trust Internet Drafts Internet Engineering Task Force Internet Engineering Task Force IkeKunze KlausWehrle DirkTrossen techreport 2019-rueth-blitzstart Blitz-starting QUIC Connections 2019 5 8 arXiv:1905.03144 [cs.NI] 1--8 https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf https://arxiv.org/abs/1905.03144 Online COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University Technical Report en JanRüth KonradWolsing MartinSerror KlausWehrle OliverHohlfeld
techreport 2019-hohlfeld-santa-tr Application-Agnostic Offloading of Packet Processing 2019 4 1 arXiv:1904.00671 [cs.NI] 1--14 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf https://arxiv.org/abs/1904.00671 Online COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University Technical Report en OliverHohlfeld HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle
techreport 2016-henze-aib-sensorcloud The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud 2016 7 11 AIB-2016-06 arXiv:1607.03239 [cs.NI] 1--24 sensorcloud fileadmin/papers/2016/2016-henze-aib-sensorcloud.pdf Online Department of Computer Science, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen University Technical Report en 0935-3232 MartinHenze RenéHummen RomanMatzutt KlausWehrle
techreport 2015-draft-moskowitz-hip-dex-04 HIP Diet EXchange (DEX) 2015 7 20 draft-moskowitz-hip-dex-04 This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-moskowitz-hip-dex-04 Online Internet Engineering Task Force Internet-Draft en RobertMoskowitz RenéHummen techreport 2015-draft-moskowitz-hip-dex-03 HIP Diet EXchange (DEX) 2015 6 19 draft-moskowitz-hip-dex-03 This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-moskowitz-hip-dex-03 Online Internet Engineering Task Force Internet-Draft en RobertMoskowitz RenéHummen techreport 2014-draft-moskowitz-hip-dex-02 HIP Diet EXchange (DEX) 2014 12 19 draft-moskowitz-hip-dex-02 This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-moskowitz-hip-dex-02 Online Internet Engineering Task Force Internet-Draft en RobertMoskowitz RenéHummen techreport 2015-aib-schmidt-hotbox HotBox: Testing Temperature Effects in Sensor Networks 2014 12 4 AIB-2014-14 arXiv:1412.2257 [cs.NI] 1--17 senserr fileadmin/papers/2014/2014-schmidt-aib-hotbox.pdf Online Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen Technical Report en 0935-3232 FlorianSchmidt MatteoCeriotti NiklasHauser KlausWehrle
techreport 2014-draft-moskowitz-hip-dex-01 HIP Diet EXchange (DEX) 2014 3 4 draft-moskowitz-hip-dex-01 This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the HIP Base EXchange (HIP BEX) [rfc5201-bis]. The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIP BEX. The HIP DEX protocol is primarily targeted at computation or memory-constrained sensor devices. Like HIP BEX, it is expected to be used together with another suitable security protocol such as the Encapsulated Security Payload (ESP) [rfc5202-bis] for the protection of upper layer protocols. HIP DEX can also be used as a keying mechanism for a MAC layer security protocol as is supported by IEEE 802.15.4 [IEEE.802-15-4.2011]. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-moskowitz-hip-dex-01 Online Internet Engineering Task Force Internet-Draft en RobertMoskowitz RenéHummen techreport 2013-schmidt-rtp-extended Support for Error Tolerance in the Real-Time Transport Protocol 2013 12 20 AIB-2013-19 arXiv:1312.5892 [cs.NI] 1--24 refector fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf Online Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen Technical Report en 0935-3232 FlorianSchmidt DavidOrlea KlausWehrle
techreport 2013-draft-hummen-dtls-extended-session-resumption-01 Extended DTLS Session Resumption for Constrained Network Environments 2013 10 18 draft-hummen-dtls-extended-session-resumption-01 This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246]. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01 Online Internet Engineering Task Force Internet-Draft en RenéHummen JohannesGilger HosseinShafagh techreport 2013-ceriotti-fgsn-appcentric Towards Application-Centric Deployment of Low-Power Wireless Networks 2013 9 13 SEEMOO-TR-2013-0 12. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze" TU Cottbus Technical Report MatteoCeriotti AlexandrKrylovskiy KlausWehrle techreport 2013-draft-garcia-core-security-06 Security Considerations in the IP-based Internet of Things 2013 9 11 draft-garcia-core-security-06 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-06 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport draft-hummen-dtls-extended-session-resumption-00 Extended DTLS Session Resumption for Constrained Network Environments 2013 7 15 draft-hummen-dtls-extended-session-resumption-00 This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246]. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-00 Online Internet Engineering Task Force Internet-Draft en RenéHummen JohannesGilger techreport 2013-draft-garcia-core-security-05 Security Considerations in the IP-based Internet of Things 2013 3 11 draft-garcia-core-security-05 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-05 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport 2013-draft-hummen-hip-middle-puzzle-01 HIP Middlebox Puzzle Offloading and End-host Notification 2013 1 9 draft-hummen-hip-middle-puzzle-01 The Host Identity Protocol [RFC5201] is a secure signaling protocol with a cryptographic namespace. It provides the communicating peers with a cryptographic puzzle mechanism to protect against Denial of Service (DoS) attacks exploiting the computation and memory overheads of the protocol exchange. This document specifies an extension of the protocol that enables an on-path network entity to assist in the choice of the puzzle difficulty in case of an attack. Furthermore, it defines a modification of the puzzle mechanism that enables a host to delegate puzzle solving to an on-path network entity. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-hummen-hip-middle-puzzle-01 Online Internet Engineering Task Force Internet-Draft en RenéHummen MartinHenze JensHiller techreport 2012-weingaertner-fgsn-sim-iot How to simulate the Internet of Things? 2012 9 26 SEEMOO-TR-2012-0 11. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze" TU Darmstadt Sammelband der Beiträge zum 11. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze" (Technical Report) EliasWeingaertner MatteoCeriotti KlausWehrle techreport 2012-draft-hummen-hip-middle-puzzle HIP Middlebox Puzzle Offloading and End-host Notification 2012 7 9 draft-hummen-hip-middle-puzzle-00 The Host Identity Protocol [RFC5201] is a secure signaling protocol with a cryptographic namespace. It provides the communicating peers with a cryptographic puzzle mechanism to protect against Denial of Service (DoS) attacks targeting its computation and memory overhead. This document specifies an extension that enables middleboxes to assist in the choice of the puzzle difficulty as well as in solving the puzzle on behalf of the host. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-hummen-hip-middle-puzzle-00 Internet Engineering Task Force Internet-Draft RenéHummen MartinHenze techreport 2012-draft-garcia-core-security Security Considerations in the IP-based Internet of Things 2012 3 26 draft-garcia-core-security-04 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-04 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport 2011-draft-garcia-core-security-03 Security Considerations in the IP-based Internet of Things 2011 10 31 draft-garcia-core-security-03 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-03 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport 2011-draft-garcia-core-security-02 Security Considerations in the IP-based Internet of Things 2011 7 11 draft-garcia-core-security-02 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-02 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport rfc6253 <prt>Host Identity Protocol Certificates</prt> 2011 5 rfc6253 The Certificate (CERT) parameter is a container for digital certificates. It is used for carrying these certificates in Host Identity Protocol (HIP) control packets. This document specifies the CERT parameter and the error signaling in case of a failed verification. Additionally, this document specifies the representations of Host Identity Tags in X.509 version 3 (v3) and Simple Public Key Infrastructure (SPKI) certificates. The concrete use of certificates, including how certificates are obtained, requested, and which actions are taken upon successful or failed verification, is specific to the scenario in which the certificates are used. Hence, the definition of these scenario- specific aspects is left to the documents that use the CERT parameter. mobile_access http://www.ietf.org/rfc/rfc6253.txt IETF RFC 6253 (Experimental) Request for Comments Internet Engineering Task Force Internet Engineering Task Force Request For Commments (Experimental Standard) 1 TobiasHeer SamuVarjonen techreport 2011-draft-garcia-core-security-01 Security Considerations in the IP-based Internet of Things 2011 3 14 draft-garcia-core-security-01 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-01 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport 2011-draft-garcia-core-security-00 Security Considerations in the IP-based Internet of Things 2011 3 7 draft-garcia-core-security-00 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-00 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport rfc5201-bis-04 <prt>Host Identity Protocol Version 2</prt> 2011 1 1 draft-ietf-hip-rfc5201-bis-04.txt <prt>expires: July 24, 2011 (work in progress)</prt> mobile_access http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela Thomas R.Henderson TobiasHeer techreport draft-ietf-hip-cert-08 <prt>Host Identity Protocol Certificates</prt> 2011 1 1 draft-ietf-hip-cert-08.txt <prt>expires: July 22, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-08 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-08 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport draft-ietf-hip-cert-07 <prt>Host Identity Protocol Certificates</prt> 2011 1 1 draft-ietf-hip-cert-07.txt <prt>expires: July 16, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-07 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-07 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport draft-ietf-hip-cert-09 <prt>Host Identity Protocol Certificates</prt> 2011 1 1 draft-ietf-hip-cert-09.txt 1 <prt>expires: July 22, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-09 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-09 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport 2011-heer-draft-middle-auth End-Host Authentication for HIP Middleboxes (Version 4) 2011 draft-heer-hip-middle-auth-04 The Host Identity Protocol [RFC5201] is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension allows middleboxes to verify the liveness and freshness of a HIP association and, thus, to secure access control in middleboxes. Work in progress ietf, mobile_access http://tools.ietf.org/html/draft-heer-hip-middle-auth-04 Online Internet Engineering Task Force Internet-Draft en TobiasHeer MiikaKomu RenéHummen KlausWehrle techreport draft-ietf-hip-cert-06 <prt>Host Identity Protocol Certificates</prt> 2010 11 1 draft-ietf-hip-cert-06.txt <prt>expires: May 23, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-06 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-06 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport draft-ietf-hip-cert-05 <prt>Host Identity Protocol Certificates</prt> 2010 11 1 draft-ietf-hip-cert-05.txt <prt>expires: May 12, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-05 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-05 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport rfc5201-bis-03 <prt>Host Identity Protocol Version 2</prt> 2010 10 1 draft-ietf-hip-rfc5201-bis-03.txt <prt>expires: April 26, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer techreport draft-ietf-hip-cert-04 <prt>Host Identity Protocol Certificates</prt> 2010 9 1 draft-ietf-hip-cert-04.txt <prt>expires: March 27, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-04 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-04 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport rfc5201-bis-01 <prt>Host Identity Protocol Version 2</prt> 2010 9 1 draft-ietf-hip-rfc5201-bis-01.txt <prt>expires: March 7, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer techreport moskowitz-rfc5201-bis-02 <prt>Host Identity Protocol Version 2</prt> 2010 7 1 draft-moskowitz-hip-rfc5201-bis-02.txt <prt>expires: January 2, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer techreport rfc5201-bis-02 <prt>Host Identity Protocol Version 2</prt> 2010 7 1 draft-ietf-hip-rfc5201-bis-02.txt <prt>expires: March 7, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer techreport draft-ietf-hip-cert-03 <prt>Host Identity Protocol Certificates</prt> 2010 4 1 draft-ietf-hip-cert-03.txt <prt>expires: October 30, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-03 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-03 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport moskowitz-rfc5201-bis-01 <prt>Host Identity Protocol Version 2</prt> 2010 3 1 draft-moskowitz-hip-rfc5201-bis-01.txt <prt>expires: September 10, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz Pekka Nikander PetriJokela ThomasR. Henderson TobiasHeer techreport draft-ietf-hip-cert-02 <prt>Host Identity Protocol Certificates</prt> 2009 10 1 draft-ietf-hip-cert-02.txt <prt>expires: April 29, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-02 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-02 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport 200908munawarfgsndynamictinyos Remote Incremental Adaptation of Sensor Network Applications 2009 9 9-12 fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf Print Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany Technical University Hamburg en WaqaasMunawar OlafLandsiedel Muhammad HamadAlizai KlausWehrle
techreport 200908alizaifgsnburstyrouting Routing Over Bursty Wireless Links 2009 9 63-66 Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators. wld fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf Print Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany en 1 Muhammad HamadAlizai OlafLandsiedel Jó AgilaBitsch Link StefanGötz KlausWehrle
techreport draft-ietf-hip-cert-01 <prt>Host Identity Protocol Certificates</prt> 2009 6 1 draft-ietf-hip-cert-01.txt <prt>expires: January 2, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport 2009-heer-draft-midauth End-Host Authentication for HIP Middleboxes (Version 2) 2009 draft-heer-hip-midauth-02 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer MiikaKomu KlausWehrle techreport 2009-heer-draft-service-id Service Identifiers for HIP 2009 draft-heer-hip-service-00 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables HIP end-hosts and HIP-aware middleboxes to announce services to HIP hosts during a HIP Base EXchange (BEX) or HIP update. Service providers are able to specify the type and requirements of a service; clients can then decide to agree on the terms of service. This allows the service provider to verify the accordance of the client with the service conditions while the client is able to verify the authenticity of the used service. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer SamuVarjonen HannoWirtz techreport draft-ietf-hip-cert-00 <prt>Host Identity Protocol Certificates</prt> 2008 10 1 draft-ietf-hip-cert-00.txt <prt>expires: January 2, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-00 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-00 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport 2008-fgsn-sasnauskas-kleenet Bug Hunting in Sensor Network Applications 2008 9 Testing sensor network applications is an essential and a difficult task. Due to their distributed and faulty nature, severe resource constraints, unobservable interactions, and limited human interaction, sensor networks, make monitoring and debugging of applications strenuous and more challenging. In this paper we present KleeNet - a Klee based platform independent bug hunting tool for sensor network applications before deployment - which can automatically test applications for all possible inputs, and hence, ensures memory safety for TinyOS based applications. Upon finding a bug, KleeNet generates a concrete test case with real input values identifying a specific error path in a program. Additionally, we show that KleeNet integrates well into TinyOS application development life cycle with minimum manual effort, making it easy for developers to test their applications. kleenet fileadmin/papers/2008/2008-09-Sasnauskas-FGSN08-BugHunting.pdf ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf Print Freie Universität Berlin, Institute of Computer Science
Berlin, Germany
Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany Chair of Communication and Distributed Systems (ComSys) en 1 RaimondasSasnauskas Jó AgilaBitsch Link Muhammad HamadAlizai KlausWehrle
techreport draft-varjonen-hip-cert-01 <prt>Host Identity Protocol Certificates</prt> 2008 7 1 draft-varjonen-hip-cert-01.txt <prt>expires: January 15, 2009 (work in progress)</prt> http://tools.ietf.org/html/draft-varjonen-hip-cert-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport 2008-fgsn-alizai-stle Challenges in Short-term Wireless Link Quality Estimation 2008 7 27-30 wld fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf Print Fachbereich Mathematik und Informatik
Berlin, Germany
Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks FGSN 08 September 2010 en 1 Muhammad HamadAlizai OlafLandsiedel KlausWehrle AlexanderBecher
techreport draft-varjonen-hip-cert-00 <prt>Host Identity Protocol Certificates</prt> 2008 2 1 draft-varjonen-hip-cert-01.txt <prt>expires: August 21, 2008 (work in progress)</prt> http://tools.ietf.org/html/draft-varjonen-hip-cert-00 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en TobiasHeer SamuVarjonen techreport 200807VOMLEHNAIB200816NetworkSimulatorComparison Comparing recent network simulators: A performance evaluation study Aachener Informatik Berichte 2008 2008-16 AIB 2008-16 1-28 Ranging from the development of new protocols to validating analytical performance metrics, network simulation is the most prevalent methodology in the field of computer network research. While the well known ns-2 toolkit has established itself as the quasi standard for network simulation, the successors are on their way. In this paper, we first survey recent contributions in the field of network simulation tools as well as related aspects such as parallel network simulation. Moreover, we present preliminary results which compare the resource demands for ns-3, JiST, SimPy and OMNeT++ by implementing the identical simulation scenario in all these network simulation tools. https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/AIB-2008-16.pdf Online
Ahornstr. 55, Aachen, Germany
RWTH Aachen University Technical Report 0935-3232 Hendrikvom Lehn EliasWeingaertner KlausWehrle
techreport 2008-heer-draft-cert-2 HIP Certificates (Version 0) 2008 This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates. Work in progress Internet Engineering Task Force Internet-Draft SamuVarjonen TobiasHeer techreport 2008-heer-draft-midauth End-Host Authentication for HIP Middleboxes (Version 1) 2008 draft-heer-hip-midauth-01 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer MiikaKomu KlausWehrle techreport 2008-heer-draft-cert HIP Certificates (Version 1) 2008 This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates. draft-varjonen-hip-cert-01.txt. Work in progress. Internet Engineering Task Force Internet-Draft SamuVarjonen TobiasHeer techreport 2007-fgsn-alizai-timetossim Accurate Timing in Sensor Network Simulations 2007 7 fileadmin/papers/2008/2007-07-fgsn-alizai-accurate-timing.pdf https://www.ds-group.info/events/fgsn07/fgsn07proc.pdf Print RWTH Aachen
Aachen, Germany
Proceedings of the 6th GI/ITG KuVS Workshop on Wireless Sensor Networks (FGSN 07) RWTH Aachen Aachen, Germany FGSN 07 July 2007 en Muhammad HamadAlizai OlafLandsiedel KlausWehrle
techreport 200706WeingaertnerFGSN07HSVNPrototype A prototype study on Hybrid Sensor-Vehicular Networks Proceedings of the 2007 GI Special Interest Meeting ("Fachgespraech") on Wireless Sensor Networks 2007 1-4 Proceedings published as technical report at RWTH Aachen. https://www.comsys.rwth-aachen.de/fileadmin/papers/2007/2007-weingaertner-kargl-fgsn.pdf Klaus Wehrle RWTH Aachen University
Bonn, Germany
RWTH Aachen Aachen, Germany Fachgespraech Sensornetzwerke 16.7.2007 / 17.7.2007 A prototype study on Hybrid Sensor-Vehicular Networks 0935-3232 1 EliasWeingaertner FrankKargl
techreport 2007-heer-draft-lhip LHIP Lightweight Authentication Extension for HIP 2007 This document specifies the Lightweight authentication extension forthe Host Identifier Protocol (LHIP). The goal of LHIP is to reduce the computational requirements of the Host Identifier Protocol (HIP), thus, making its benefits, such as end-host mobility and multihoming, accessible to CPU-restricted devices. LHIP reduces the computational cost of establishing, updating, and closing a HIP association by providing an alternative way of signing and verifying HIP control packets which is based on computationally inexpensive hash function computations and hash chains. However, LHIP does not provide nor does it aim at providing the same level of security as HIP does. Especially, host authentication and payload encryption are not possible. The LHIP extensions in this draft specify also mechanisms for dynamic transitioning between lightweight and full HIP associations on the fly. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer techreport 200707SNFGProceedings 6. Fachgespräch Sensornetzwerke der GI/ITG Fachgruppe "Kommunikation und Verteilte Systeme" 2007 AIB 2007-11
Aachen, Germany
Distributed Systems Group, RWTH Aachen University Proceedings of Workshop KlausWehrle
techreport 2007-heer-draft-midauth End-Host Authentication for HIP Middleboxes 2007 draft-heer-hip-midauth-00 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer techreport 200608riechetrmmog Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games 2006 8 WSI-2006-04 Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive beta-testing suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world. RWTH Aachen University - Distributed Systems Group http://www.rieche.net/pdf/wsi-2006-04.pdf Online
Tübingen, Germany
Wilhelm-Schickard-Institute for Computer Science, University of Tübingen Technical Report en SimonRieche MarcFouquet HeikoNiedermayer LeoPetrak KlausWehrle GeorgCarle
techreport 200605OCALATechReportUCB OCALA: An Architecture for Supporting Legacy Applications over Overlays 2005 UCB/CSD-005/1397 The ever increasing demand of new applications coupled with the increasing rigidity of the Internet has led researchers to propose overlay networks as a means of introducing new functionality in the Internet. However, despite sustained efforts, few overlays are used widely. Providing support for legacy Internet applications to access such overlays would significantly expand the user base of the overlays, as the users can instantly benefit from the overlay functionality. We present the design and implementation of OCALA, an Overlay Convergence Architecture for Legacy Applications. Unlike previous efforts, OCALA allows users to access different overlays simultaneously, as well as hosts in different overlays to communicate with each other. In addition, OCALA reduces the implementation burden on the overlay developers, by factoring out the functions commonly required to support legacy applications, such as tapping legacy traffic, authentication and encryption. Our implementation of OCALA as a proxy requires no changes to the applications or operating systems. We currently support two overlays, i3 and RON, on Linux and Windows XP/2000 platforms. We (and a few other research groups and end-users) have used the proxy over a eleven-month period with many legacy applications ranging from web browsers to remote desktop applications. http://ocala.cs.berkeley.edu
UCB, Berkeley, USA
University of California at Berkeley DilipJoseph JayanthkumarKannan AyumuKubota IonStoica KlausWehrle
techreport 200606i3proxytechreport Supporting Legacy Applications over i3 2004 UCB/CSD-04-1342 Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique which allows the proxy to tunnel the legacy traffic over the overlay transparently. Our solution can preserve IP packet headers on an end-to-end basis, even when end-host IP addresses change, or when endhosts live in different address spaces (e.g., behind NATs). In addition, our solution allows the use of human-readable names to refer to hosts or services, and requires no changes to applications or operating systems. To illustrate how the proxy enables legacy applications to take advantage of the overlay (i.e., i3) functionality, we present four examples: enabling access to machines behind NAT boxes, secure Intranet access, routing legacy traffic through Bro, an intrusion detection system, and anonymous web download. We have implemented the proxy on Linux andWindows XP/2000 platforms, and used it over the i3 service on PlanetLab over a three month period with a variety of legacy applications ranging from web browsers to operating system-specific file sharing. http://i3.cs.berkeley.edu
UCB, Berkeley, USA
University of California at Berkeley Technical Report JayanthkumarKannan AyumuKubota KarthikLakshminarayanan IonStoica KlausWehrle