% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-05-04 % Creation time: 22-08-19 % --- Number of references % 16 % @Inproceedings { Varj1112:Secure, title = {Secure Resolution of {End-Host} Identifiers for Mobile Clients}, year = {2011}, month = {12}, day = {5}, abstract = {Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT}, keywords = {DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution}, url = {fileadmin/papers/2011/2011-varjonen-secure.pdf}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award}, state = {accepted}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Varjonen, Samu and Heer, Tobias and Rimey, Kenneth and Gurtov, Andrei} } @Techreport { 2011-draft-garcia-core-security-03, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {10}, day = {31}, number = {draft-garcia-core-security-03}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { Dombrowski2011LCN, title = {Hard Real-Time Wireless Medium Access in Action: Stop the Guillotine Within a Millisecond!}, year = {2011}, month = {10}, day = {4}, pages = {1--3}, url = {http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_dombrowski.pdf}, web_url = {http://www.ieeelcn.org/prior/LCN36/lcn36demos.html}, booktitle = {Proc. of Local Computer Networks Conference, Demonstrations, (LCN'11)}, event_place = {Bonn, Germany}, event_name = {36th IEEE Conference on Local Computer Networks (LCN)}, event_date = {04/10/2011}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Article { 2011-heer-iot-journal, title = {Security Challenges in the IP-based Internet of Things}, journal = {Springer Wireless Personal Communications Journal}, year = {2011}, month = {10}, volume = {61}, number = {3}, pages = {527-542}, abstract = {A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.}, tags = {iotsec}, url = {fileadmin/papers/2011/2011-heer-iot-challenges.pdf}, misc2 = {Online}, publisher = {Springer}, address = {Netherlands}, language = {en}, ISSN = {0929-6212}, DOI = {10.1007/s11277-011-0385-5}, reviewed = {1}, author = {Heer, Tobias and Garcia-Morchon, Oscar and Hummen, Ren{\'e} and Keoh, Sye Loong and Kumar, Sandeep S. and Wehrle, Klaus} } @Inproceedings { 2011-wintech-alizai-tinywifi, title = {TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers}, year = {2011}, month = {9}, pages = {19-27}, tags = {tinywifi}, url = {fileadmin/papers/2011/2010-09-tinywifi-alizai-wintech.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH ), Las Vegas, NV, USA}, event_place = {Las Vegas, NV, USA}, event_name = {The 17th Annual International Conference on Mobile Computing and Networking}, event_date = {September 2011}, language = {en}, ISBN = {978-1-4503-0867-0}, DOI = {10.1145/2030718.2030725}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kirchen, Bernhard and Vaegs, Tobias and Gnawali, Omprakash and Wehrle, Klaus} } @Inproceedings { 2011-kunz-mascots-performance-prediction, title = {Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations}, year = {2011}, month = {7}, day = {25}, pages = {359 - 368}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-performance-prediction-mascots.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'11), Singapore}, event_place = {Singapore}, event_name = {19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems}, event_date = {July 25-17, 2011}, language = {en}, ISBN = {978-1-4577-0468-0}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2011.15}, reviewed = {1}, author = {Kunz, Georg and Tenbusch, Simon and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-02, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {7}, day = {11}, number = {draft-garcia-core-security-02}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-02}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-iscc-alizai-ble, title = {Efficient Online Estimation of Bursty Wireless Links}, year = {2011}, month = {6}, url = {fileadmin/papers/2011/2011-alizai-iscc-ble.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {16th IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece}, event_place = {Kerkyra, Greece}, language = {en}, ISBN = {978-1-4577-0678-3}, DOI = {10.1109/ISCC.2011.5983839}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kunz, Georg and Grap, Benjamin and Wehrle, Klaus} } @Inproceedings { Dombrowski2011RealWIN, title = {Reducing Outage Probability Over Wireless Channels Under Hard Real-time Constraints}, year = {2011}, month = {4}, day = {11}, pages = {1 -6}, booktitle = {Proc. of Workshop on Real-Time Wireless For Industrial Applications (RealWIN'11)}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Inproceedings { 2011-ipsn-alizai-pad, title = {Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks}, year = {2011}, month = {4}, url = {fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA}, event_place = {Chicago, IL, USA}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and G{\"o}tz, Stefan and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2011-kunz-omnetpp-horizon, title = {Runtime Efficient Event Scheduling in Multi-threaded Network Simulation}, year = {2011}, month = {3}, day = {21}, pages = {359-366}, abstract = {Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation. We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \textbackslashemph\{push-based event handling scheme\} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \textbackslashemph\{event scheduling algorithm\} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {4th International Workshop on OMNeT++ (OMNeT++'11)}, event_date = {March 21, 2011}, language = {en}, ISBN = {978-1-936968-00-8}, DOI = {10.4108/icst.simutools.2011.245504}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-01, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {14}, number = {draft-garcia-core-security-01}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Techreport { 2011-draft-garcia-core-security-00, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {7}, number = {draft-garcia-core-security-00}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { PunalScOff11, title = {{Combined Subcarrier Switch Off and Power Loading for 80 MHz Bandwidth WLANs}}, year = {2011}, booktitle = {Proc. of the 18th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN'11)}, author = {Pu{\~n}al, Oscar and Gross, James} } @Inproceedings { Punal11, title = {{Performance Comparison of Loading Algorithms for 80 MHz IEEE 802.11 WLANs}}, year = {2011}, pages = {124--132}, booktitle = {Proc. of the 73rd IEEE Vehicular Technology Conference (VTC-Spring'11)}, author = {Pu{\~n}al, Oscar and Escudero, Humberto and Gross, James} } @Inproceedings { Li2011ICC, title = {{Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access}}, year = {2011}, pages = {1 -6}, booktitle = {Proc. of IEEE International Conference on Communications (ICC'11)}, author = {Li, Di and Gross, James} }