This file was created by the TYPO3 extension bib --- Timezone: UTC Creation date: 2024-12-03 Creation time: 15-33-39 --- Number of references 19 inproceedings 2011-wirtz-kaleidoscope Cooperative Wi-Fi-Sharing: Encouraging Fair Play 2011 12 14 mobile_access fileadmin/papers/2011/2011-wirtz-kaleidoscope.pdf Online
ITU
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa Cape Town, South Africa ITU-T Kaleidoscope: The fully networked human? 2011-12-12 en 978-92-61-13651-2 1 HannoWirtz RenéHummen NicolaiViol TobiasHeer Mónica AlejandraLora Girón KlausWehrle
inproceedings Varj1112:Secure Secure Resolution of <prt>End-Host</prt> Identifiers for Mobile Clients 2011 12 5 Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution fileadmin/papers/2011/2011-varjonen-secure.pdf Online IEEE
Piscataway, NJ, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award accepted en 978-1-4244-9268-8 1930-529X 1 SamuVarjonen TobiasHeer KennethRimey AndreiGurtov
techreport 2011-draft-garcia-core-security-03 Security Considerations in the IP-based Internet of Things 2011 10 31 draft-garcia-core-security-03 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-03 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik article 2011-heer-iot-journal Security Challenges in the IP-based Internet of Things Springer Wireless Personal Communications Journal 2011 10 61 3 527-542 A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols. iotsec fileadmin/papers/2011/2011-heer-iot-challenges.pdf Online Springer
Netherlands
en 0929-6212 10.1007/s11277-011-0385-5 1 TobiasHeer OscarGarcia-Morchon RenéHummen Sye LoongKeoh Sandeep S.Kumar KlausWehrle
inproceedings 2011-wirtz-chants Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode 2011 9 23 fileadmin/papers/2011/2011-wirtz-chants.pdf Online ACM
New York, NY, USA
Proceedings of the ACM MobiCom Workshop on Challenged Networks (Chants 2011), Las Vegas, NV, USA Las Vegas, NV, USA ACM MobiCom Workshop on Challenged Networks (Chants 2011) 2011-09-23 en 978-1-4503-0870-0 10.1145/2030652.2030666 1 HannoWirtz TobiasHeer RobertBackhaus KlausWehrle
inproceedings 2011-wintech-wirtz Demo: Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode 2011 9 19 89-90 Mobile Ad-Hoc Networks (MANETs) rely on the 802.11 ad- hoc mode to establish communication with nearby peers. In practice, this makes MANETs hard to realize. While 802.11-compliant mobile devices implement the ad-hoc mode on the hardware layer, the software layer typically does not implement support for ad-hoc networking in terms of ad-hoc routing and name resolution protocols. Modern mobile operating systems, such as Android and iOS, even hide the inherent ad-hoc functionality of the wireless card through restrictions in the OS. In contrast to this, support for the 802.11 infrastructure mode is a commodity. We propose establishing ad-hoc networks using the 802.11 infrastructure mode. In MA-Fi (Mobile Ad-Hoc Wi-Fi), a small core of mobile router nodes (RONs) provides infrastruc-ture mode network access to mobile station nodes (STANs). As RONs also act as a station in infrastructure networks of other RONs, MA-Fi achieves multi-hop communication between RON and STAN devices in the overall network. We show the creation and operation of mobile ad-hoc networks using MA-Fi. We focus on mobility of RONs and STANs as well as topology control in the overall network. fileadmin/papers/2011/2011-wirtz-wintech.pdf Online ACM
New York, NY, USA
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA Las Vegas, Nevada, USA The Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization 2011-09-19 en 978-1-4503-0867-0 10.1145/2030718.2030737 1 HannoWirtz RobertBackhaus RenéHummen KlausWehrle
techreport 2011-draft-garcia-core-security-02 Security Considerations in the IP-based Internet of Things 2011 7 11 draft-garcia-core-security-02 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-02 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik inproceedings 2011-hummen-pisa-demo PISA-SA - Security and Mobility in a Collaborative Muni-Fi (Demo Abstract) 2011 6 15 15 35--36 mobile_access fileadmin/papers/2011/2011-hummen-wisec-pisa-sa-demo.pdf Online ACM
New York, NY, USA
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany Hamburg, Germany Wireless Network Security 2011 (WiSec 2011) en 1559-1662 10.1145/2073290.2073297 1 RenéHummen HannoWirtz NicolaiViol TobiasHeer KlausWehrle
techreport rfc6253 <prt>Host Identity Protocol Certificates</prt> 2011 5 rfc6253 The Certificate (CERT) parameter is a container for digital certificates. It is used for carrying these certificates in Host Identity Protocol (HIP) control packets. This document specifies the CERT parameter and the error signaling in case of a failed verification. Additionally, this document specifies the representations of Host Identity Tags in X.509 version 3 (v3) and Simple Public Key Infrastructure (SPKI) certificates. The concrete use of certificates, including how certificates are obtained, requested, and which actions are taken upon successful or failed verification, is specific to the scenario in which the certificates are used. Hence, the definition of these scenario- specific aspects is left to the documents that use the CERT parameter. mobile_access http://www.ietf.org/rfc/rfc6253.txt IETF RFC 6253 (Experimental) Request for Comments Internet Engineering Task Force Internet Engineering Task Force Request For Commments (Experimental Standard) 1 TobiasHeer SamuVarjonen inproceedings 2011-nsdi-slicetime-weingaertner SliceTime: A platform for scalable and accurate network emulation 2011 3 30 https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-nsdi-slicetime-camera_ready_14P.pdf Online USENIX
Berkeley, CA, USA
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA Boston, Massachusetts en 1 EliasWeingaertner FlorianSchmidt Hendrikvom Lehn TobiasHeer KlausWehrle
inproceedings OttHLVK2011 Floating Content: Information Sharing in Urban Areas 2011 3 21 Content sharing using personal web pages, blogs, or online social networks is a common means for people to maintain contact with their friends, colleagues, and acquaintances. While such means are essential to overcome distances, using infrastructure services for location-based services may not be desirable. In this paper, we analyze a fully distributed variant of an ephemeral content sharing service, solely dependent on the mobile devices in the vicinity using principles of opportunistic networking. The net result is a best effort service for floating content in which: 1) information dissemination is geographically limited; 2) the lifetime and spreading of information depends on interested nodes being available; 3) content can only be created and distributed locally; and 4) content can only be added, but not explicitly deleted. First we present our system design and summarize its analytical modeling. Then we perform extensive evaluation for a map-based mobility model in downtown Helsinki to assess the operational range for floating content, which, at the same time also validate the analytical results obtained for a more abstract model of the system. https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-percom-vaegs-floatingcontent.pdf Online IEEE
Piscataway, NJ, USA
Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, WA, USA Seattle, USA 9th IEEE International Conference on Pervasive Computing and Communications March 21 - 25, 2011 en 978-1-4244-9529-0 1 JörgOtt EsaHyytiä PasiLassila TobiasVaegs JussiKangasharju
techreport 2011-draft-garcia-core-security-01 Security Considerations in the IP-based Internet of Things 2011 3 14 draft-garcia-core-security-01 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-01 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik techreport 2011-draft-garcia-core-security-00 Security Considerations in the IP-based Internet of Things 2011 3 7 draft-garcia-core-security-00 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-00 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik article 2011-03-Zimmermann IP address assignment in wireless mesh networks Wireless Communications and Mobile Computing 2011 3 11 3 321-337 Online John Wiley & Sons Ltd.
Hoboken, NJ, USA
en 10.1002/wcm.982 1 AlexanderZimmermann ArndHannemann BenjaminSchleinzer
techreport rfc5201-bis-04 <prt>Host Identity Protocol Version 2</prt> 2011 1 1 draft-ietf-hip-rfc5201-bis-04.txt <prt>expires: July 24, 2011 (work in progress)</prt> mobile_access http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela Thomas R.Henderson TobiasHeer techreport draft-ietf-hip-cert-08 <prt>Host Identity Protocol Certificates</prt> 2011 1 1 draft-ietf-hip-cert-08.txt <prt>expires: July 22, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-08 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-08 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport draft-ietf-hip-cert-07 <prt>Host Identity Protocol Certificates</prt> 2011 1 1 draft-ietf-hip-cert-07.txt <prt>expires: July 16, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-07 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-07 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport draft-ietf-hip-cert-09 <prt>Host Identity Protocol Certificates</prt> 2011 1 1 draft-ietf-hip-cert-09.txt 1 <prt>expires: July 22, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-09 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-09 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport 2011-heer-draft-middle-auth End-Host Authentication for HIP Middleboxes (Version 4) 2011 draft-heer-hip-middle-auth-04 The Host Identity Protocol [RFC5201] is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension allows middleboxes to verify the liveness and freshness of a HIP association and, thus, to secure access control in middleboxes. Work in progress ietf, mobile_access http://tools.ietf.org/html/draft-heer-hip-middle-auth-04 Online Internet Engineering Task Force Internet-Draft en TobiasHeer MiikaKomu RenéHummen KlausWehrle