This file was created by the TYPO3 extension
bib
--- Timezone: UTC
Creation date: 2024-12-06
Creation time: 00-53-57
--- Number of references
123
article
2024_pennekamp_supply-chain-survey
An Interdisciplinary Survey on Information Flows in Supply Chains
ACM Computing Surveys
2024
2
1
56
2
Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.
information flows; data communication; supply chain management; data security; data sharing; systematic literature review
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf
ACM
0360-0300
10.1145/3606693
1
JanPennekamp
RomanMatzutt
ChristopherKlinkmüller
LennartBader
MartinSerror
EricWagner
SidraMalik
MariaSpiß
JessicaRahn
TanGürpinar
EduardVlad
Sander J. J.Leemans
Salil S.Kanhere
VolkerStich
KlausWehrle
inproceedings
2023-wagner-lcn-repel
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
2023
10
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wagner-repel.pdf
IEEE
48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US
Daytona Beach, Florida, US
IEEE Conference on Local Computer Networks (LCN)
Oktober 1-5, 2023
accepted
en
1
EricWagner
NilsRothaug
KonradWolsing
LennartBader
KlausWehrle
MartinHenze
inproceedings
2023_pennekamp_benchmarking_comparison
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
2023
6
15
13901
489-505
Benchmarking is an essential tool for industrial organizations to identify potentials that allows them to improve their competitive position through operational and strategic means. However, the handling of sensitive information, in terms of (i) internal company data and (ii) the underlying algorithm to compute the benchmark, demands strict (technical) confidentiality guarantees—an aspect that existing approaches fail to address adequately. Still, advances in private computing provide us with building blocks to reliably secure even complex computations and their inputs, as present in industry benchmarks. In this paper, we thus compare two promising and fundamentally different concepts (hardware- and software-based) to realize privacy-preserving benchmarks. Thereby, we provide detailed insights into the concept-specific benefits. Our evaluation of two real-world use cases from different industries underlines that realizing and deploying secure information systems for industry benchmarking is possible with today's building blocks from private computing.
Lecture Notes in Computer Science (LNCS), Volume 13901
real-world computing; trusted execution environments; homomorphic encryption; key performance indicators; benchmarking
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-industry-benchmarking.pdf
Springer
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain
Zaragoza, Spain
35th International Conference on Advanced Information Systems Engineering (CAiSE '23)
June 12-16, 2023
978-3-031-34559-3
0302-9743
10.1007/978-3-031-34560-9_29
1
JanPennekamp
JohannesLohmöller
EduardVlad
JoschaLoos
NiklasRodemann
PatrickSapel
Ina BereniceFink
SethSchmitz
ChristianHopmann
MatthiasJarke
GüntherSchuh
KlausWehrle
MartinHenze
incollection
2023_pennekamp_crd-a.i
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
2023
2
8
35-60
The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_2
1
JanPennekamp
AnastasiiaBelova
ThomasBergs
MatthiasBodenbenner
AndreasBührig-Polaczek
MarkusDahlmanns
IkeKunze
MoritzKröger
SandraGeisler
MartinHenze
DanielLütticke
BenjaminMontavon
PhilippNiemietz
LuciaOrtjohann
MaximilianRudack
Robert H.Schmitt
UweVroomen
KlausWehrle
MichaelZeng
incollection
2023_rueppel_crd-b2.ii
Model-Based Controlling Approaches for Manufacturing Processes
2023
2
8
221-246
The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).
Process control; Model-based control; Data aggregation; Model identification; Model optimization
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_7
1
Adrian KarlRüppel
MuzafferAy
BenediktBiernat
IkeKunze
MarkusLandwehr
SamuelMann
JanPennekamp
PascalRabe
Mark P.Sanders
DominikScheurenberg
SvenSchiller
TiandongXi
DirkAbel
ThomasBergs
ChristianBrecher
UweReisgen
Robert H.Schmitt
KlausWehrle
inproceedings
2022-rechenberg-cim
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
2022
10
Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf
https://zenodo.org/record/7148794
Zenodo
European Workshop on Maritime Systems Resilience and Security (MARESEC 2022)
Bremerhaven, Germany
10.5281/zenodo.7148794
1
Merlinvon Rechenberg
NinaRößler
MariSchmidt
KonradWolsing
FlorianMotz
MichaelBergmann
ElmarPadilla
JanBauer
article
2022-jakobs-technologytransfer
Too many or too few Standards Setters? Evidence from the Performance of Firms engaged in Standardization
The Journal of Technology Transfer
2022
9
12
Theoretical models suggest that standardisation activities in the market may be too high or too low with respect to the market optimum. This paper investigates the association of standardisation engagement with firms'performance as indirect evidence of a sub-optimal level of market standardisation activities. Anecdotal evidence has it that firms can benefit from engagement in standardisation activities, but large quantitative studies on this topic are rather scarce. Based on a large innovation survey, this paper implements matching models to compare outcomes of firms with similar features but different standardisation activities. The outcomes of interest are several measures of innovation and growth. Standardisers and non-standardisers are matched onto a rich set of control variables. Firms engaged in standardisation have better innovation performance than firms with no such activities. However, the results for the performance measures are rather mixed, showing no association or negative association with labour productivity measures. Heteroscedasticity-based instruments mitigate possible endogeneity issues. These results can be interpreted as indirect evidence of low standardisation activity in the market, possibly due to long payback periods and appropriability issues of the standardisation investment.
10.1007/s10961-022-09951-z
1
Cesare Antonio FabioRiillo
KaiJakobs
article
2022_brauner_iop
A Computer Science Perspective on Digital Transformation in Production
ACM Transactions on Internet of Things
2022
5
1
3
2
The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.
Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf
ACM
2691-1914
10.1145/3502265
1
PhilippBrauner
ManuelaDalibor
MatthiasJarke
IkeKunze
IstvánKoren
GerhardLakemeyer
MartinLiebenberg
JudithMichael
JanPennekamp
ChristophQuix
BernhardRumpe
Wilvan der Aalst
KlausWehrle
AndreasWortmann
MartinaZiefle
techreport
draft-irtf-coinrg-use-cases-06
Use Cases for In-Network Computing
2022
3
draft-irtf-coinrg-use-cases-06
expires: 8 September 2022 (work in progress)
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf
https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/
Online
IETF Trust
Internet Drafts
Internet Engineering Task Force
Internet Engineering Task Force
IkeKunze
KlausWehrle
DirkTrossen
Marie-JoséMontpetit
Xavierde Foy
DavidGriffin
MiguelRio
article
2022-wolsing-aistracks
Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches
Journal of Marine Science and Engineering
2022
1
14
10
1
The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, speed, and course of the sending vessels. AIS can thus serve as a tool to avoid collisions and increase onboard situational awareness. In recent years, AIS has been utilized in more and more applications since it enables worldwide surveillance of virtually any larger vessel and has the potential to greatly support vessel traffic services and collision risk assessment. Anomalies in AIS tracks can indicate events that are relevant in terms of safety and also security. With a plethora of accessible AIS data nowadays, there is a growing need for the automatic detection of anomalous AIS data. In this paper, we survey 44 research articles on anomaly detection of maritime AIS tracks. We identify the tackled AIS anomaly types, assess their potential use cases, and closely examine the landscape of recent AIS anomaly research as well as their limitations.
automatic identification system; AIS; anomaly detection; maritime safety; maritime security; maritime surveillance
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-aistracks.pdf
https://www.mdpi.com/2077-1312/10/1/112
en
10.3390/jmse10010112
1
KonradWolsing
LinusRoepert
JanBauer
KlausWehrle
article
2022-jakobs-ieeetem
Luring European SMEs into ICT Standardization–Problems, Issues, and a Potential Way Forward
IEEE Transactions on Engineering Management
2022
1-12
Common standards are essential for Information and Communication Technologies (ICT). Several studies suggest that (almost) all standardization working groups (WGs) are dominated by large firms and small and medium-sized enterprises (SMEs) and are typically marginalized. However, SMEs account for around 99% of all enterprises in the EU; their active participation in the standardization process would thus be crucial to develop ICT standards that meet the needs of the vast majority of their users. This article first discusses the current situation of SMEs in ICT standardization and the associated issues. Second, it conducts an econometric analysis to investigate the drivers of the use of ICT standards and engagement in ICT standardization based on a large and representative survey from Luxembourg. Regardless of their size, firms that actually and consciously deploy ICT standards in their core business are much more prepared to participate in standards-setting actively than those that do not. The article also proposes a way to exploit this correlation. The resulting implications for standards-setting organizations and policymakers are discussedn.
10.1109/TEM.2022.3226121
1
Cesare Antonio FabioRiillo
KaiJakobs
inproceedings
2021-kunze-spin-tracker
Tracking the QUIC Spin Bit on Tofino
2021
12
7
15–21
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-spin-tracker.pdf
ACM
Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ '21)
9781450391351
10.1145/3488660.3493804
1
IkeKunze
ConstantinSander
KlausWehrle
JanRüth
inproceedings
2021-krude-nfp-pred
Determination of Throughput Guarantees for Processor-based SmartNICs
2021
12
7
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-krude-nfp-pred.pdf
ACM
The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21)
978-1-4503-9098-9/21/12
10.1145/3485983.3494842
1
JohannesKrude
JanRüth
DanielSchemmel
FelixRath
Iohannes-HeorhFolbort
KlausWehrle
inproceedings
2021-sander-shardingrevisited
Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?
2021
11
2
legato
/fileadmin/papers/2021/2021-sander-sharding-revisited.pdf
https://arxiv.org/abs/2110.14239
ACM
Proceedings of the Internet Measurement Conference (IMC '21)
Internet Measurement Conference 2021
02.11.21 - 04.11.21
978-1-4503-9129-0/21/11
10.1145/3487552.3487832
1
ConstantinSander
LeoBlöcher
KlausWehrle
JanRüth
inproceedings
2021_reuter_demo
Demo: Traffic Splitting for Tor — A Defense against Fingerprinting Attacks
2021
9
14
Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.
Electronic Communications of the EASST, Volume 080
Onion Routing; Website Fingerprinting; Multipath Traffic; Privacy
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-reuter-splitting-demo.pdf
TU Berlin
Proceedings of the 2021 International Conference on Networked Systems (NetSys '21), September 13-16, 2021, Lübeck, Germany
Lübeck, Germany
September 13-16, 2021
1863-2122
10.14279/tuj.eceasst.80.1151
1
SebastianReuter
JensHiller
JanPennekamp
AndriyPanchenko
KlausWehrle
inproceedings
2021-kunze-efm-evaluation
L, Q, R, and T - Which Spin Bit Cousin Is Here to Stay?
2021
7
22 - 28
/fileadmin/papers/2021/2021-kunze-efm-evaluation.pdf
ACM
ANRW '21: Proceedings of the Applied Networking Research Workshop
Virtual Event
Applied Networking Research Workshop (ANRW '21)
July 2021
10.1145/3472305.3472319
1
IkeKunze
KlausWehrle
JanRüth
inproceedings
2021-glebke-service-based-forwarding
Service-based Forwarding via Programmable Dataplanes
2021
6
10
reflexes
/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf
IEEE
Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)
978-1-6654-4005-9
2325-5609
10.1109/HPSR52026.2021.9481814
1
RenéGlebke
DirkTrossen
IkeKunze
DavidLou
JanRüth
MirkoStoffers
KlausWehrle
inproceedings
2021-kunze-aqm-tofino-p4
Tofino + P4: A Strong Compound for AQM on High-Speed Networks?
2021
5
72-80
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf
IFIP/IEEE
Proceedings of the International Symposium on Integrated Network Management (IM '21)
Virtual Event
International Symposium on Integrated Network Management (IM '21)
May 2021
978-1-7281-9041-9
1
IkeKunze
MoritzGunz
DavidSaam
KlausWehrle
JanRüth
inproceedings
2021-sander-zoom-cc
Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM
2021
3
internet-of-production
/fileadmin/papers/2021/2021-sander-zoom-fairness-aqm.pdf
https://arxiv.org/abs/2107.00904
Springer
Proceedings of the Passive and Active Measurement Conference (PAM '21)
Passive and Active Measurement Conference (PAM 2021)
10.1007/978-3-030-72582-2_1
1
ConstantinSander
IkeKunze
KlausWehrle
JanRüth
inproceedings
2021-jacobs-euras-sme
Luring SMEs into ICT Standardisation
2021
16
459-478
Kai Jakobs
Mainz Publishers
EURAS Contributions to Standardisation Research
Joint Proceedings: Standardisation and Innovation (EURAS 2021) and The Past, Present and Future of ICT Standardisation (SIIT 2021)
25th EURAS Annual Standardisation Conference and 11th International Conference on Standardisation and Innovation in Information Technology (SIIT)
1
Cesare Antonio FabioRiillo
KaiJakobs
inproceedings
2021-jakobs-euras-standard
Too Much or Too Little Standardization? - The performance of firms engaged in standardization
2021
16
479-498
Kai Jakobs
Mainz Publishers
EURAS Contributions to Standardisation Research
Joint Proceedings: Standardisation and Innovation (EURAS 2021) and The Past, Present and Future of ICT Standardisation (SIIT 2021)
25th EURAS Annual Standardisation Conference and 11th International Conference on Standardisation and Innovation in Information Technology (SIIT)
1
Cesare Antonio FabioRiillo
KaiJakobs
inproceedings
2020_pennekamp_benchmarking
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
2020
12
15
31-44
Benchmarking the performance of companies is essential to identify improvement potentials in various industries. Due to a competitive environment, this process imposes strong privacy needs, as leaked business secrets can have devastating effects on participating companies. Consequently, related work proposes to protect sensitive input data of companies using secure multi-party computation or homomorphic encryption. However, related work so far does not consider that also the benchmarking algorithm, used in today's applied real-world scenarios to compute all relevant statistics, itself contains significant intellectual property, and thus needs to be protected. Addressing this issue, we present PCB — a practical design for Privacy-preserving Company Benchmarking that utilizes homomorphic encryption and a privacy proxy — which is specifically tailored for realistic real-world applications in which we protect companies' sensitive input data and the valuable algorithms used to compute underlying key performance indicators. We evaluate PCB's performance using synthetic measurements and showcase its applicability alongside an actual company benchmarking performed in the domain of injection molding, covering 48 distinct key performance indicators calculated out of hundreds of different input values. By protecting the privacy of all participants, we enable them to fully profit from the benefits of company benchmarking.
practical encrypted computing; homomorphic encryption; algorithm confidentiality; benchmarking; key performance indicators; industrial application; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-company-benchmarking.pdf
https://eprint.iacr.org/2020/1512
HomomorphicEncryption.org
Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event
Virtual Event
December 15, 2020
978-3-00-067798-4
10.25835/0072999
1
JanPennekamp
PatrickSapel
Ina BereniceFink
SimonWagner
SebastianReuter
ChristianHopmann
KlausWehrle
MartinHenze
inproceedings
2020_delacadena_trafficsliver
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
2020
11
12
1971-1985
Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction of packets. By collecting traffic traces at a malicious Tor entry node — one of the weakest adversaries in the attacker model of Tor — a passive eavesdropper can leverage the captured meta-data to reveal the websites visited by a Tor user. As recently shown, WFP is significantly more effective and realistic than assumed. Concurrently, former WFP defenses are either infeasible for deployment in real-world settings or defend against specific WFP attacks only.
To limit the exposure of Tor users to WFP, we propose novel lightweight WFP defenses, TrafficSliver, which successfully counter today’s WFP classifiers with reasonable bandwidth and latency overheads and, thus, make them attractive candidates for adoption in Tor. Through user-controlled splitting of traffic over multiple Tor entry nodes, TrafficSliver limits the data a single entry node can observe and distorts repeatable traffic patterns exploited by WFP attacks. We first propose a network-layer defense, in which we apply the concept of multipathing entirely within the Tor network. We show that our network-layer defense reduces the accuracy from more than 98% to less than 16% for all state-of-the-art WFP attacks without adding any artificial delays or dummy traffic. We further suggest an elegant client-side application-layer defense, which is independent of the underlying anonymization network. By sending single HTTP requests for different web objects over distinct Tor entry nodes, our application-layer defense reduces the detection rate of WFP classifiers by almost 50 percentage points. Although it offers lower protection than our network-layer defense, it provides a security boost at the cost of a very low implementation overhead and is fully compatible with today’s Tor network.
Traffic Analysis; Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-delacadena-trafficsliver.pdf
https://github.com/TrafficSliver
ACM
Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS '20), November 9-13, 2020, Orlando, FL, USA
Virtual Event, USA
November 9-13, 2020
978-1-4503-7089-9/20/11
10.1145/3372297.3423351
1
WladimirDe la Cadena
AsyaMitseva
JensHiller
JanPennekamp
SebastianReuter
JulianFilter
KlausWehrle
ThomasEngel
AndriyPanchenko
phdthesis
2020-rueth-phd-thesis
Measuring the Evolution of the Internet in the Age of Giants
2020
11
https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-7660-8
Shaker Verlag
Shaker Verlag, Düren, Germany
Reports on Communications and Distributed Systems
20
RWTH Aachen University
Ph.D. Thesis
978-3-8440-7660-8
JanRüth
article
2020-holz-ccr-tls13
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
ACM SIGCOMM Computer Communications Review (CCR)
2020
7
50
3
3-15
Selected for the 'Best of CCR' session at SIGCOMM 2021.
https://ccronline.sigcomm.org/wp-content/uploads/2020/08/sigcomm-ccr-paper430-with-open-review.pdf
Association for Computing Machinery
New York, NY, USA
10.1145/3411740.3411742
1
RalphHolz
JensHiller
JohannaAmann
AbbasRazaghpanah
ThomasJost
NarseoVallina-Rodriguez
OliverHohlfeld
inproceedings
2020-schemmel-porse
Symbolic Partial-Order Execution for Testing Multi-Threaded Programs
2020
7
symbiosys
https://arxiv.org/pdf/2005.06688.pdf
https://arxiv.org/abs/2005.06688
Computer Aided Verification (CAV 2020)
32nd International Conference on Computer Aided Verification
10.1007/978-3-030-53288-8_18
1
DanielSchemmel
JulianBüning
CésarRodríguez
DavidLaprell
KlausWehrle
inproceedings
2020-mann-ur-weldseamstudy
Study on weld seam geometry control for connected gas metal arc welding systems
2020
6
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf
Proceedings of the 2020 Internal Conference on Ubiquitous Robots
Internal Conference on Ubiquitous Robots
June 22-26, 2020
10.1109/UR49135.2020.9144839
1
SamuelMann
RenéGlebke
IkeKunze
DominikScheurenberg
RahulSharma
UweReisgen
KlausWehrle
DirkAbel
inproceedings
2020_roepert_opcua
Assessing the Security of OPC UA Deployments
2020
4
2
To address the increasing security demands of industrial deployments, OPC UA is one of the first industrial protocols explicitly designed with security in mind. However, deploying it securely requires a thorough configuration of a wide range of options. Thus, assessing the security of OPC UA deployments and their configuration is necessary to ensure secure operation, most importantly confidentiality and integrity of industrial processes. In this work, we present extensions to the popular Metasploit Framework to ease network-based security assessments of OPC UA deployments. To this end, we discuss methods to discover OPC UA servers, test their authentication, obtain their configuration, and check for vulnerabilities. Ultimately, our work enables operators to verify the (security) configuration of their systems and identify potential attack vectors.
internet-of-production, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-roepert-opcua-security.pdf
en
University of Tübingen
Proceedings of the 1st ITG Workshop on IT Security (ITSec '20), April 2-3, 2020, Tübingen, Germany
Tübingen, Germany
April 2-3, 2020
10.15496/publikation-41813
1
LinusRoepert
MarkusDahlmanns
Ina BereniceFink
JanPennekamp
MartinHenze
article
2020_mann_welding_layers
Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers
Advanced Structured Materials
2020
4
1
125
101-118
A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production.
Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19)
Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy
Internet-of-Production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf
Springer
Ponta Delgada, Azores, Portugal
October 24-25, 2019
978-981-15-2956-6
1869-8433
10.1007/978-981-15-2957-3_8
1
SamuelMann
JanPennekamp
TobiasBrockhoff
AnahitaFarhang
MahsaPourbafrani
LukasOster
Merih SeranUysal
RahulSharma
UweReisgen
KlausWehrle
Wilvan der Aalst
inproceedings
2020-kosek-tcp-conformance
MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild
2020
3
30
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf
https://arxiv.org/abs/2002.05400
Springer
Proceedings of the Passive and Active Measurement Conference (PAM '20)
Eugene, Oregon, USA
Passive and Active Measurement Conference (PAM 2020)
30.03.2020 - 31.03.2020
en
https://doi.org/10.1007/978-3-030-44081-7_8
1
MikeKosek
LeoBlöcher
JanRüth
TorstenZimmermann
OliverHohlfeld
article
2020-wehrle-digitalshadows
Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus
Der Profilbereich "Information & Communication Technology"
2020
0179-079X
10.18154/RWTH-2021-02496
MatthiasJarke
Wilvan der Aalst
ChristianBrecher
MatthiasBrockmann
IstvánKoren
GerhardLakemeyer
BernhardRumpe
GüntherSchuh
KlausWehrle
MartinaZiefle
article
2019-kunze-ccwild-tnsm
Congestion Control in the Wild - Investigating Content Provider Fairness
IEEE Transactions on Network and Service Management
2019
12
27
17
2
1224 - 1238
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-kunze-ccwild-tnsm.pdf
1932-4537
10.1109/TNSM.2019.2962607
1
IkeKunze
JanRüth
OliverHohlfeld
inproceedings
2019-glebke-in-network-cv
Towards Executing Computer Vision Functionality on Programmable Network Devices
2019
12
9
reflexes,maki,internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf
Online
ACM
1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)
en
978-1-4503-7000-4/19/12
10.1145/3359993.3366646
1
RenéGlebke
JohannesKrude
IkeKunze
JanRüth
FelixSenger
KlausWehrle
inproceedings
2019-rueth-quic-userstudy
Perceiving QUIC: Do Users Notice or Even Care?
2019
12
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-quic-userstudy.pdf
https://arxiv.org/abs/1910.07729
ACM
In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19)
Orlando, Florida, USA
International Conference on emerging Networking EXperiments and Technologies
9.12.2019-12.12.2019
10.1145/3359989.3365416
1
JanRüth
KonradWolsing
KlausWehrle
OliverHohlfeld
inproceedings
2019_pennekamp_multipath
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
2019
10
7
Users of an onion routing network, such as Tor, depend on its anonymity properties. However, especially malicious entry nodes, which know the client’s identity, can also observe the whole communication on their link to the client and, thus, conduct several de-anonymization attacks. To limit this exposure and to impede corresponding attacks, we propose to multipath traffic between the client and the middle node to reduce the information an attacker can obtain at a single vantage point. To facilitate the deployment, only clients and selected middle nodes need to implement our approach, which works transparently for the remaining legacy nodes. Furthermore, we let clients control the splitting strategy to prevent any external manipulation.
Poster Session
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-multipathing.pdf
IEEE
Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA
Chicago, IL, USA
27th IEEE International Conference on Network Protocols (ICNP 2019)
7-10. Oct. 2019
978-1-7281-2700-2
2643-3303
10.1109/ICNP.2019.8888029
1
JanPennekamp
JensHiller
SebastianReuter
WladimirDe la Cadena
AsyaMitseva
MartinHenze
ThomasEngel
KlausWehrle
AndriyPanchenko
inproceedings
2019-sander-depcci
DeePCCI: Deep Learning-based Passive Congestion Control Identification
2019
8
18
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf
https://arxiv.org/abs/1907.02323
ACM
In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI '19)
Beijing, China
Workshop on Network Meets AI & ML
18.08.2019
10.1145/3341216.3342211
1
ConstantinSander
JanRüth
OliverHohlfeld
KlausWehrle
inproceedings
2019-wolsing-quicperf
A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC
2019
7
22
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wolsing-quicperf.pdf
https://arxiv.org/abs/1906.07415
ACM
In Proceedings of the Applied Networking Research Workshop (ANRW '19)
Montreal, Quebec, Canada
Applied Networking Research Workshop at IETF-105
2019-07-22
10.1145/3340301.3341123
1
KonradWolsing
JanRüth
KlausWehrle
OliverHohlfeld
inproceedings
2019-hohlfeld-bpfperf
Demystifying the Performance of XDP BPF
2019
6
25
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf
IEEE
IEEE International Conference on Network Softwarization (NetSoft)
IEEE International Conference on Network Softwarization
10.1109/NETSOFT.2019.8806651
1
OliverHohlfeld
JohannesKrude
Jens HelgeReelfs
JanRüth
KlausWehrle
inproceedings
2019-rueth-ccfness
An Empirical View on Content Provider Fairness
2019
6
19
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-ccfness.pdf
https://arxiv.org/abs/1905.07152
IFIP/IEEE
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19)
Paris, France
Network Traffic Measurement and Analysis Conference
19.06.2019 - 21.06.2019
10.23919/TMA.2019.8784684
1
JanRüth
IkeKunze
OliverHohlfeld
inproceedings
ReelfsMHH2019
Hashtag Usage in a Geographically-Local Microblogging App
2019
5
13
919-927
Anonymous Messaging; Location Based Messaging; User Behavior and Engagement; Information Diffusion; Hashtag
comtex
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-reelfs-jodel-hashtags.pdf
ACM
Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA
San Francisco, California, USA
International Workshop on Location and the Web
May 13–17, 2019
978-1-4503-6675-5/19/05
10.1145/3308560.3316537
1
HelgeReelfs
TimonMohaupt
OliverHohlfeld
NiklasHenckell
inproceedings
2019_pennekamp_infrastructure
Towards an Infrastructure Enabling the Internet of Production
2019
5
8
31-37
New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.
Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf
IEEE
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW
Taipei, TW
May 6-9, 2019
978-1-5386-8500-6/19
10.1109/ICPHYS.2019.8780276
1
JanPennekamp
RenéGlebke
MartinHenze
TobiasMeisen
ChristophQuix
RihanHai
LarsGleim
PhilippNiemietz
MaximilianRudack
SimonKnape
AlexanderEpple
DanielTrauth
UweVroomen
ThomasBergs
ChristianBrecher
AndreasBührig-Polaczek
MatthiasJarke
KlausWehrle
techreport
2019-rueth-blitzstart
Blitz-starting QUIC Connections
2019
5
8
arXiv:1905.03144 [cs.NI]
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf
https://arxiv.org/abs/1905.03144
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
JanRüth
KonradWolsing
MartinSerror
KlausWehrle
OliverHohlfeld
techreport
2019-hohlfeld-santa-tr
Application-Agnostic Offloading of Packet Processing
2019
4
1
arXiv:1904.00671 [cs.NI]
1--14
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf
https://arxiv.org/abs/1904.00671
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
OliverHohlfeld
HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2019-rueth-icmp
Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane
2019
3
27
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf
https://arxiv.org/abs/1901.07265
Springer
In Proceedings of the Passive and Active Measurement Conference (PAM '19)
Puerto Varas, Chile
Passive and Active Measurement Conference (PAM 2019)
27.3.2018 - 29.3.2018
en
10.1007/978-3-030-15986-3_4
1
JanRüth
TorstenZimmermann
OliverHohlfeld
inproceedings
2019-glebke-wirelessgain
Enabling Wireless Network Support for Gain Scheduled Control
2019
3
25
reflexes,spp
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf
ACM
In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
Dresden, Germany
International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
25.03.2019
10.1145/3301418.3313943
1
SebastianGallenmüller
RenéGlebke
StephanGünther
EricHauser
MauriceLeclaire
StefanReif
JanRüth
AndreasSchmidt
GeorgCarle
ThorstenHerfet
WolfgangSchröder-Preikschat
KlausWehrle
article
rueth:iw:TNSM19
TCP’s Initial Window – Deployment in the Wild and its Impact on Performance
IEEE Transactions on Network and Service Management
2019
1
30
16
2
389--402
maki
http://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf
1932-4537
10.1109/TNSM.2019.2896335
1
JanRüth
IkeKunze
OliverHohlfeld
proceedings
2018-QuicTesting
Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution
2018
12
4
erc,symbiosys
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rath-quictesting.pdf
https://dl.acm.org/citation.cfm?id=3284853
https://arxiv.org/abs/1811.12099
ACM
Heraklion, Greece
EPIQ'18 Workshop Paper
4.12.2018
en
978-1-4503-6082-1
10.1145/3284850.3284853
1
FelixRath
DanielSchemmel
KlausWehrle
inproceedings
2018-rueth-mining
Digging into Browser-based Crypto Mining
2018
10
31
maki,internet-measurements
http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf
https://arxiv.org/abs/1808.00811
ACM
Proceedings of the Internet Measurement Conference (IMC '18)
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278539
1
JanRüth
TorstenZimmermann
KonradWolsing
OliverHohlfeld
inproceedings
2018-hiller-lcn-lowlatencyiiot
Secure Low Latency Communication for Constrained Industrial IoT Scenarios
2018
10
connect,iop,nerd-nrw
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-lcn-secure_low_latency_communication_iiot.pdf
IEEE
43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA
Chicago, USA
43nd IEEE Conference on Local Computer Networks (LCN)
October 1-4, 2018
en
978-1-5386-4413-3
10.1109/LCN.2018.8638027
1
JensHiller
MartinHenze
MartinSerror
EricWagner
Jan NiklasRichter
KlausWehrle
inproceedings
2018-hohlfeld-santa
Application-Agnostic Offloading of Datagram Processing
2018
9
3
maki,ssiclops,reflexes
https://ieeexplore.ieee.org/document/8493053
IEEE
Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria
Vienna, Austria
International Teletraffic Congress ITC 30
03.09.2018 - 07-09.2018
en
10.1109/ITC30.2018.00015
1
OliverHohlfeld
Jens HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2018-rueth-reflexnetcompute
Towards In-Network Industrial Feedback Control
2018
8
20
reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexnetcompute.pdf
ACM
Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18)
Budapest, Hungary
ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute 2018)
20.08.2018
10.1145/3229591.3229592
1
JanRüth
RenéGlebke
KlausWehrle
VedadCausevic
SandraHirche
inproceedings
2018-rueth-iwcdns
Demystifying TCP Initial Window Configurations of Content Distribution Networks
2018
6
26
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-iwcdns.pdf
https://arxiv.org/abs/1902.08937
http://tma.ifip.org/2018/wp-content/uploads/sites/3/2018/06/tma2018_paper13.pdf
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18)
Vienna, Austria
Network Traffic Measurement and Analysis Conference (TMA'18)
26.06.2018 - 29.06.2018
10.23919/TMA.2018.8506549
1
JanRüth
OliverHohlfeld
inproceedings
2018-rueth-reflexdemo
Demo: Towards In-Network Processing for Low-Latency Industrial Control
2018
4
15
reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexdemo.pdf
IEEE Computer Society
In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Honolulu, HI, USA
International Conference on Computer Communications (INFOCOM)
15.04.2018 - 19.04.2018
en
10.1109/INFCOMW.2018.8406844
1
JanRüth
RenéGlebke
TanjaUlmen
KlausWehrle
inproceedings
2018-rueth-quicadoptionstudy
A First Look at QUIC in the Wild
2018
3
26
255-268
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-quicadoptionstudy.pdf
https://arxiv.org/abs/1801.05168
Springer, Cham
In Proceedings of the Passive and Active Measurement Conference (PAM '18)
Berlin, Germany
Passive and Active Measurement Conference (PAM 2018)
26.3.2018 - 27.3.2018
en
978-3-319-76481-8
10.1007/978-3-319-76481-8_19
1
JanRüth
IngmarPoese
ChristophDietzel
OliverHohlfeld
inproceedings
2018-tzimmermann-metacdn
Characterizing a Meta-CDN
2018
3
26
114-128
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf
https://arxiv.org/abs/1803.09990
Springer, Cham
In Proceedings of the Passive and Active Measurement Conference (PAM '18)
Berlin, Germany
Passive and Active Measurement Conference (PAM 2018)
26.3.2018 - 27.3.2018
en
978-3-319-76480-1
10.1007/978-3-319-76481-8_9
1
OliverHohlfeld
JanRüth
KonradWolsing
TorstenZimmermann
inproceedings
2018-tzimmermann-split
SPLIT: Smart Protocol Loading for the IoT
2018
2
14
iop
https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf
https://dl.acm.org/citation.cfm?id=3234847.3234854
ACM
Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain
Madrid, Spain
European Conference on Wireless Sensor Networks (EWSN 2018)
14.2.2018 - 16.2.2018
en
978-0-9949886-2-1
1
TorstenZimmermann
JensHiller
Jens HelgeReelfs
PascalHein
KlausWehrle
inproceedings
2017-poormohammady
Dynamic Algorithm Selection for the Logic of Tasks in IoT Stream Processing Systems
13th International Conference on Network and Service Management
2017
11
26
Online
IEEE
13th International Conference on Network and Service Management, Tokyo, Japan
en
10.23919/CNSM.2017.8256009
1
EhsanPoormohammady
Jens HelgeReelfs
MirkoStoffers
KlausWehrle
ApostolosPapageorgiou
inproceedings
2017-rueth-iwmeasure
Large-Scale Scanning of TCP’s Initial Window
2017
11
1
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf
ACM
In Proceedings of the Internet Measurement Conference (IMC '17)
London, UK
Proceedings of the 2017 Internet Measurement Conference
01.11.2017 - 03.11.2017
en
10.1145/3131365.3131370
1
JanRüth
ChristianBormann
OliverHohlfeld
conference
2017-fink-brainlab-gmds
BrainLab - Ein Framework für mobile neurologische Untersuchungen
2017
8
29
Best Abstract Award
https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml
06.09.19
German Medical Science GMS Publishing House (2017)
62. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS).
Oldenburg
GMDS 2017
17-21 September 2017
10.3205/17gmds137
1
Ina BereniceFink
BerndHankammer
ThomasStopinski
YannicTitgemeyer
RoannRamos
EkaterinaKutafina
Jó AgilaBitsch
Stephan MichaelJonas
proceedings
2017-SymPerfPoster
SymPerf: Predicting Network Function Performance
2017
8
21
spp,erc,symbiosys,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf
ACM
Los Angeles, USA
ACM SIGCOMM 2017 Poster
21.8.2017 - 25.8.2017
en
978-1-4503-5057-0/17/08
10.1145/3123878.3131977
1
FelixRath
JohannesKrude
JanRüth
DanielSchemmel
OliverHohlfeld
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2017-zimmermann-networking-http2
How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push
2017
6
12
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf
IEEE
Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden
Stockholm, Sweden
IFIP Networking 2017
12.-16.6.2017
978-3-901882-94-4
10.23919/IFIPNetworking.2017.8264830
1
TorstenZimmermann
JanRüth
BenediktWolters
OliverHohlfeld
article
dombrowski-vdi
Funktechnologien für Industrie 4.0
VDE Positionspapier
2017
6
1
VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.
Stresemannallee 15, 60596 Frankfurt am Main, Germany
IsmetAktas
AlexanderBentkus
FlorianBonanati
ArminDekorsy
ChristianDombrowski
MichaelDoubrava
AliGolestani
FrankHofmann
MikeHeidrich
StefanHiensch
RüdigerKays
MichaelMeyer
AndreasMüller
Stephanten Brink
NedaPetreska
MilanPopovic
LutzRauchhaupt
AhmadSaad
HansSchotten
ChristophWöste
IngoWolff
conference
2017-fink-brainlab
BrainLab – towards mobile brain research
2017
4
24
2
/fileadmin/papers/2017/2017-fink-brainlab.pdf
http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf
2017-05-09
Online
Informatics for Health 2017, Manchester UK
Manchester, UK
Informatics for Health 2017, Manchester UK
24-26 April 2017
en
1
Ina BereniceFink
BerndHankammer
ThomasStopinsky
RoannRamos
EkaterinaKutafina
Jó AgilaBitsch Link
StephanJonas
inproceedings
2017-ziegeldorf-codaspy-priward
Privacy-Preserving HMM Forward Computation
2017
3
22
83-94
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf
Online
ACM
Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA
en
978-1-4503-4523-1
10.1145/3029806.3029816
1
Jan HenrikZiegeldorf
JanMetzke
JanRüth
MartinHenze
KlausWehrle
incollection
2016-iiot-rueth-comm
Communication and Networking for the Industrial Internet of Things
2017
317-346
Online
Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B.
Springer
Industrial Internet of Things
en
978-3-319-42558-0
10.1007/978-3-319-42559-7_12
1
JanRüth
FlorianSchmidt
MartinSerror
KlausWehrle
TorstenZimmermann
inproceedings
2016-henze-cloudcom-trinics
Towards Transparent Information on Individual Cloud Service Usage
2016
12
12
366-370
trinics
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf
Online
IEEE
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg
en
978-1-5090-1445-3
10.1109/CloudCom.2016.0064
1
MartinHenze
DanielKerpen
JensHiller
MichaelEggert
DavidHellmanns
ErikMühmer
OussamaRenuli
HenningMaier
ChristianStüble
RogerHäußling
KlausWehrle
inproceedings
2016-matzutt-ccs-bitcoin
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
2016
10
24
1769-1771
mynedata
/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf
Online
ACM
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria
en
978-1-4503-4139-4
10.1145/2976749.2989059
1
RomanMatzutt
OliverHohlfeld
MartinHenze
RobinRawiel
Jan HenrikZiegeldorf
KlausWehrle
article
2015-cheng-piap-jmu
Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening
JMIR Mhealth Uhealth
2016
7
20
4
3
e88
piap
http://mhealth.jmir.org/2016/3/e88/
http://www.ncbi.nlm.nih.gov/pubmed/27439444
Online
en
2291-5222
10.2196/mhealth.5284
1
Paula Glenda FerrerCheng
Roann MunozRamos
Jó AgilaBitsch Link
Stephan MichaelJonas
TimIx
Portia Lynn QuetulioSee
KlausWehrle
inproceedings
2016-ramos-inpact-lexicon
How Do I Say "Sad?" Building a Depression-Lexicon for Psychologist in a Pocket
2016
4
30
1--6
29% Acceptance rate
/fileadmin/misc/2016/2016-ramos-inpact-lexicon.pdf
http://inpact-psychologyconference.org/2016/conference-program/
Online
Clara Pracana and Michael Wang
World Institute for Advanced Research and Science
Lisbon, Portugal
Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)
Lisbon, Portugal
International Psychological Applications Conference and Trends (InPACT 2016)
April 30 -- May 2, 2016
en
978-989-99389-6-0
1
Roann MunozRamos
Paula Glenda FerrerCheng
Jó AgilaBitsch Link
Stephan MichaelJonas
inproceedings
2016-ramos-inpact-feeling-meh
Feeling Meh: Psychologist in a pocket app for depression screening
2016
4
30
1--4
29% Acceptance rate
/fileadmin/misc/2016/2016-ramos-inpact-feeling-meh.pdf
http://inpact-psychologyconference.org/2016/conference-program/
Online
Clara Pracana and Michael Wang
World Institute for Advanced Research and Science
Lisbon, Portugal
Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)
Lisbon, Portugal
International Psychological Applications Conference and Trends (InPACT 2016)
April 30 -- May 2, 2016
en
978-989-99389-6-0
1
Roann MunozRamos
Paula Glenda FerrerCheng
Jó AgilaBitsch Link
Stephan MichaelJonas
article
2016-fgcs-henze-iotprivacy
A Comprehensive Approach to Privacy in the Cloud-based Internet of Things
Future Generation Computer Systems
2016
3
56
701-718
ipacs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-fgcs-iotprivacy.pdf
Online
Elsevier
en
0167-739X
10.1016/j.future.2015.09.016
1
MartinHenze
LarsHermerschmidt
DanielKerpen
RogerHäußling
BernhardRumpe
KlausWehrle
inproceedings
2016-zimmermann-wons-mirco
Maintaining Integrity and Reputation in Content Offloading
2016
1
25-32
maki
http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-zimmermann-wons-mirco.pdf
IEEE
12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy
Cortina d'Ampezzo, Italy
12th International Conference on Wireless On-demand Network Systems and Services (WONS)
January 20 - 22 2016
en
978-3-901882-80-7
1
TorstenZimmermann
JanRüth
HannoWirtz
KlausWehrle
inproceedings
2015-wirtz-secon
Enabling Ubiquitous Interaction with Smart Things
2015
6
24
256-264
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf
http://www.comsys.rwth-aachen.de/short/secon15-stif
Online
IEEE
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA
Seattle, USA
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015)
22.06.2015 - 25.06.2015
en
10.1109/SAHCN.2015.7338324
1
HannoWirtz
JanRüth
MartinSerror
TorstenZimmermann
KlausWehrle
inproceedings
2015-bitsch-phealth-piap
Psychologist in a Pocket: Towards Depression Screening on Mobile Phones
2015
6
2
211
153 --159
Depression is the most prevalent clinical disorder and one of the main causes of disability. This makes early detection of depressive symptoms critical in its prevention and management. This paper presents and discusses the development of Psychologist in a Pocket (PiaP), a mental mHealth application for Android which screens and monitors for these symptoms, and–given the explicit permission of the user–alerts a trusted contact such as the mental health professional or a close friend, if it detects symptoms.
All text inputted electronically–such as short message services, emails, social network posts–is analyzed based on keywords related to depression based on DSM-5 and ICD criteria as well as Beck's Cognitive Theory of Depression and the Self-Focus Model. Data evaluation and collection happen in the background, on- device, without requiring any user involvement. Currently, the application is in an early prototype phase entering initial clinical validation.
fileadmin/papers/2015/2015-bitsch-phealth-piap.pdf
Print
Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin
IOS Press
Amsterdam
Studies in Health Technology and Informatics
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
Västerås, Sweden
12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
June 2-4, 2015
en
978-1-61499-515-9
0926-9630
10.3233/978-1-61499-516-6-153
1
Jó AgilaBitsch Link
RoannRamos
TimIx
Paula GlendaFerrer Cheng
KlausWehrle
inproceedings
2015-bitsch-phealth-brain
Towards Brain Research in a Pocket:
Bringing EEG Research and Diagnostics out of the Lab
2015
6
2
211
185 -- 190
Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment.
We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach.
fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf
Print
Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin
IOS Press
Amsterdam
Studies in Health Technology and Informatics
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
Västerås, Sweden
12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
June 2-4, 2015
en
978-1-61499-515-9
0926-9630
10.3233/978-1-61499-516-6-185
1
Jó AgilaBitsch Link
RoannRamos
CassandraSeverijns
KlausWehrle
incollection
2013-wtc-eggert-sensorcloud
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
2014
12
14
203-218
sensorcloud
fileadmin/papers/2013/2013-wtc-eggert-sensorcloud.pdf
Online
Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard
Springer
Trusted Cloud Computing
en
978-3-319-12717-0
10.1007/978-3-319-12718-7_13
1
MichaelEggert
RogerHäußling
MartinHenze
LarsHermerschmidt
RenéHummen
DanielKerpen
AntonioNavarro Pérez
BernhardRumpe
DirkThißen
KlausWehrle
inproceedings
2014-wirtz-mum-dcmv
Facilitating Direct and Ubiquitous Mobile Computer Vision
2014
11
27
fileadmin/papers/2014/2014-wirtz-mum-mcv.pdf
Online
ACM
The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014), Melbourne, Australia
Melbourne, Australia
The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014)
en
978-1-4503-3304-7
10.1145/2677972.2677974
1
HannoWirtz
JanRüth
KlausWehrle
inproceedings
2014-chants-wirtz-disco
Opportunistic Interaction in the Challenged Internet of Things
2014
9
7
1-8
fileadmin/papers/2014/2014-wirtz-chants-challenged_iot.pdf
online
ACM
Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, USA
Maui, Hawaii, USA
Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014)
7 September 2014
en
978-1-4503-3071-8
10.1145/2645672.2645679
1
HannoWirtz
JanRüth
MartinSerror
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2014-ficloud-henze-upecsi
User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things
2014
8
27
191-196
ipacs
/fileadmin/papers/2014/2014-ficloud-henze-upecsi.pdf
Online
IEEE
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain
Barcelona, Spain
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014)
en
978-1-4799-4357-9
10.1109/FiCloud.2014.38
1
MartinHenze
LarsHermerschmidt
DanielKerpen
RogerHäußling
BernhardRumpe
KlausWehrle
inproceedings
2014-bitsch-extremecom-demo
Demo: Opportunistic Mobile Brain Research
2014
8
14
1--2
The majority of research using brain imaging and EEG techniques is currently limited to clinical environments, restricting experiments to synthetic tasks in controlled conditions.
Lifting these limitations brought about by this artificial set-up would allow us to perform neuropsychological assessments and research in mobile settings or at locations easier accessible to patients, possibly even in remote, hard to access areas.
We developed a tablet based mobile framework to present auditory and visual stimuli, capture wireless commercial EEG and screen interaction data, and analyze the recorded data for immediate evaluation, as well as share the data over internet or local opportunistic links.
To demonstrate the feasibility of our approach, we successfully replicated the experimental set-up and evaluation pipeline of two existing EEG studies on event-related potentials.
This work therefore lays the foundation to further truly mobile brain research and health-care applications.
fileadmin/papers/2014/2014-bitsch-extremcom-mobile-eeg-demo.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 6th Extreme Conference on Communication
Galapagos Islands, Ecuador
6th Extreme Conference on Communication
August 11-15, 2014
en
978-1-4503-2929-3
1
Jó AgilaBitsch Link
RoannRamos
DavidOrlea
KlausWehrle
inproceedings
2014-hummen-delegation
Delegation-based Authentication and Authorization for the IP-based Internet of Things
2014
6
30
284-292
iotsec; sensorcloud
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf
Online
IEEE
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014)
Singapore
11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014)
30.06. - 03.07.2014
en
10.1109/SAHCN.2014.6990364
1
RenéHummen
HosseinShafagh
ShahidRaza
ThiemoVoigt
KlausWehrle
inproceedings
2014-mobisys-rueth-uiso
Demo: Ubiquitous Interaction with Smart Objects
2014
6
355-356
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-rueth-mobisys-uiso.pdf
http://www.comsys.rwth-aachen.de/short/mobisys14-demo
Online
ACM
Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14), Bretton Woods, New Hampshire, USA
Bretton Woods
12th Annual International Conference on Mobile Systems, Applications, and Services
16-19 June 2014
en
978-1-4503-2793-0
10.1145/2594368.2601477
1
JanRüth
HannoWirtz
KlausWehrle
inproceedings
2014-mmsys-wirtz-ubifi
A Wireless Application Overlay for Ubiquitous Mobile Multimedia Sensing and Interaction
2014
3
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-wirtz-mmsys-ubifi.pdf
Online
ACM
Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore
Singapore
5th ACM Multimedia Systems Conference
19-21 March 2014
en
978-1-4503-2705-3
10.1145/2557642.2578224
1
HannoWirtz
JanRüth
TorstenZimmermann
MatteoCeriotti
KlausWehrle
article
2013-raza-lithe
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal
2013
10
13
10
3711-3720
Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security
iotsec
en
1530-437X
10.1109/JSEN.2013.2277656
1
ShahidRaza
HosseinShafagh
KasunHewage
RenéHummen
ThiemoVoigt
inproceedings
2013-chants-wirtz-heaven
Interest-based Cloud-facilitated Opportunistic Networking
2013
9
30
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf
Online
ACM
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA
Miami, USA
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013)
30 September 2013
en
978-1-4503-2363-5
10.1145/2505494.2505504
1
HannoWirtz
JanRüth
TorstenZimmermann
KlausWehrle
inproceedings
2013-hummen-towards
Towards Viable Certificate-based Authentication for the Web of Things
2013
4
19
iotsec
fileadmin/papers/2013/2013-hummen-towards.pdf
ACM
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Budapest, Hungary
2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy
en
978-1-4503-2003-0
10.1145/2463183.2463193
1
RenéHummen
Jan HenrikZiegeldorf
HosseinShafagh
ShahidRaza
KlausWehrle
inproceedings
2012-IPIN-Viol-HMM
Hidden Markov Model-based 3D Path-matching using Raytracing-generated Wi-Fi Models
2012
11
13
1--10
fileadmin/papers/2012/2012-11-viol-ipin.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6418873&tag=1
Online
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia
Sydney, Australia
2012 International Conference on Indoor Positioning and Indoor Navigation
November 13--15, 2012
en
978-1-4673-1955-3
10.1109/IPIN.2012.6418873
1
NicolaiViol
Jó AgilaBitsch Link
HannoWirtz
DirkRothe
KlausWehrle
inproceedings
2012-stoffers-mascots-ns3-propagation-models
Comparing the ns–3 Propagation Models
2012
8
61--67
nonRWTH
https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-ns3-propagation-models.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6298165
Print
IEEE
Proceedings of the 20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'12), Washington D.C., USA
Washington D.C., USA
20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)
en
978-1-4673-2453-3
10.1109/MASCOTS.2012.17
1
MirkoStoffers
GeorgeRiley
inproceedings
2012-stoffers-pads-hybrid-simulation
Hybrid Simulation of Packet-Level Networks and Functional-Level Routers
2012
7
111--119
nonRWTH
https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-hybrid-simulation.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6305897
Print
IEEE
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China
Zhangjiajie, China
en
978-0-7695-4714-5
1087-4097
10.1109/PADS.2012.22
1
MirkoStoffers
GeorgeRiley
inproceedings
2012-wons-bosling-redmann-weingaertner
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
2012
1
9
131-134
https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-students-6lowpan-wons2012.pdf
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6138950#
Online
IEEE
Piscataway, NJ, USA
Proceedings of the 9th International Conference on
Wireless On-demand Network Systems and Services (WONS '12), Courmayeur, Italy
Courmayeur, Italy
en
978-1-4577-1722-2
10.1109/WONS.2012.6152218
1
MarcelBosling
TorstenRedmann
JeanTekam
EliasWeingaertner
KlausWehrle
inproceedings
Varj1112:Secure
Secure Resolution of <prt>End-Host</prt> Identifiers for Mobile Clients
2011
12
5
Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT
DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution
fileadmin/papers/2011/2011-varjonen-secure.pdf
Online
IEEE
Piscataway, NJ, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award
accepted
en
978-1-4244-9268-8
1930-529X
1
SamuVarjonen
TobiasHeer
KennethRimey
AndreiGurtov
article
2011-kai-JITSR
Project Report: Standardising the Internet of Things – What the Experts Think
Int. J. on IT Standards & Standardisation Research
2011
1
9
1
fileadmin/papers/2011/2011-kai-JITSR.pdf
print
IGI Global
Hershey, PA, US
1539-3062
1
KaiJakobs
ThomasWagner
KaiReimers
techreport
rfc5201-bis-03
<prt>Host Identity Protocol Version 2</prt>
2010
10
1
draft-ietf-hip-rfc5201-bis-03.txt
<prt>expires: April 26, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
inproceedings
2010softcomweingaertnerprotocolanalysis
Flexible Analysis of Distributed Protocol Implementations using Virtual Time
2010
9
23
225 - 229
available in IEEE Xplore
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-weingaertner-softcom-analysis.pdf
Online
FESB
Split, Croatia
Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010)
Hvar, Croatia
en
978-1-4244-8663-2
1
EliasWeingaertner
MarkoRitter
RaimondasSasnauskas
KlausWehrle
techreport
rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
9
1
draft-ietf-hip-rfc5201-bis-01.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
moskowitz-rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-moskowitz-hip-rfc5201-bis-02.txt
<prt>expires: January 2, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-ietf-hip-rfc5201-bis-02.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
moskowitz-rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
3
1
draft-moskowitz-hip-rfc5201-bis-01.txt
<prt>expires: September 10, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz Pekka Nikander
PetriJokela
ThomasR. Henderson
TobiasHeer
inproceedings
2010-kai-mccsis.pdf
Standardising the IoT – Collaboration or Competition?
2010
62-66
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
CD
Sandeep Krishnamurthy, Gurmit Singh, Maggie McPherson
IADIS, International Association for Development of the Information Society
Proc. e-Democracy, Equity and Social Justice - EDEM2010, Freiburg, Germany
en
978-972-8939-24-3
1
KaiJakobs
ThomasWagner
KaiReimers
inproceedings
2010-kai-erima
Developing Standards for the IoT - A Collaborative Exercise!?
2010
3
108-116
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
Online, CD
L. Legardeur; K. North
ERIMA
Bidart, FR
Towards new challenges for innovative management practices
en
2100-0778
1
KaiJakobs
ThomasWagner
KaiReimers
conference
200810riechelcncerco
Range Queries and Load Balancing in a Hierarchically Structured P2P System
2008
10
14
28-35
Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, are used more and more for file-sharing and content distribution applications. However, a major weakness of traditional DHTs is the search for stored content, as data is assigned to nodes based on hash functions, and the very nature of hash tables allows only exact pattern matches. We present Cerco, a solution for the problem of range queries by using the principles of order-preserving DHTs and a hierarchically structured P2P approach. To guarantee an efficient routing and load balancing, Cerco uses a dynamic hierarchy of DHTs by creating subrings on demand and two explicit load balancing strategies. Our evaluation shows that Cerco is able to achieve the goals of supporting range queries, logarithmic-hop routing, and efficient load balancing.
RWTH Aachen University - Distributed Systems Group
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4664131&arnumber=4664148&count=180&index=16
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/matthew/Mirror_LCN2008_Website/www.ieeelcn.org/
Print
IEEE Press
Proceedings of 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)
IEEE
Montreal, Canada
33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)
14-17 Oct. 2008
en
978-1-4244-2412-2
10.1109/LCN.2008.4664148
1
SimonRieche
Bui TheVinh
KlausWehrle
conference
200803riechemmvecluster
Clustering Players for Load Balancing in Virtual Worlds
2008
3
18
9-13
Massively Multiplayer Online Games (MMOGs) have become increasingly popular in the last years. So far the distribution of load, caused by the players in these games, is not distributed dynamically. After the launch of a new game, the introduction of new content, during special ingame events, or also during normal operations, players tend to concentrate in certain regions of the game worlds and cause overload conditions. Therefore we propose the use of structured P2P technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas; however this approach often split a group of players to different servers, causing additional overhead. This work presents a cluster-based Peer-to-Peer approach, which can be used for load balancing in MMOGs or in other virtual worlds. The system is able to dynamically adapt to the current state of the game and handle uneven distributions of the players in the game world. We show through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based systems, which split the world in rectangular areas.
RWTH Aachen University - Distributed Systems Group
http://www.pap.vs.uni-due.de/MMVE08/papers/proceedings.pdf
http://www.pap.vs.uni-due.de/MMVE08/
Online
Gregor Schiele, Daniel Weiskopf, Ben Leong, Shun-Yun Hu
Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008)
Reno, Nevada, USA
1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008)
March 8th, 2008
en
1
SimonRieche
KlausWehrle
MarcFouquet
HeikoNiedermayer
TimoTeifel
GeorgCarle
article
200812riecheIJAMCcluster
Clustering Players for Load Balancing in Virtual Worlds
International Journal of Advanced Media and Communication (IJAMC)
2008
2
4
351-363
In current Massively Multiplayer Online Games (MMOGs) the distribution of load is not distributed dynamically. But players tend to concentrate in certain regions of the game world and cause overload conditions. Therefore we propose the use of structured Peer-to-Peer technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas but often split a group of players to different servers. This work presents a cluster-based P2P approach, which is able to dynamically adapt to the current state of the game and handle uneven distributions of players.Weshow through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based system.
RWTH Aachen University - Distributed Systems Group
http://www.inderscience.com/browse/index.php?journalID=67
print
en
1462-4613
1
SimonRieche
KlausWehrle
MarcFouquet
HeikoNiedermayer
TimoTeifel
GeorgCarle
conference
200701riecheccncmmog
Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games
2007
1
11
763-767
Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive betatesting suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world.
RWTH Aachen University - Distributed Systems Group
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4199088&arnumber=4199243&count=254&index=154
http://www.ieee-ccnc.org/2007/
Print
IEEE Press
Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007)
IEEE
Las Vegas, Nevada, USA
4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007)
11-13 January 2007
en
1-4244-0667-6
10.1109/CCNC.2007.155
1
SimonRieche
KlausWehrle
MarcFouquet
HeikoNiedermayer
LeoPetrak
GeorgCarle
conference
rieche2006cerco
Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System
2006
11
14
509-510
Structured Peer-to-Peer systems are designed for a highly scalable,
self organizing, and efficient lookup for data. The key space of the
so-called Distributed Hash Tables (DHTs) is partitioned and each
partition with its keys and values is assigned to a node in the DHT.
For data retrieval however, the very nature of hash tables allows
only exact pattern matches.
We propose Cerco, a simple solution for the problem of range queries
by employing a hierarchically structured P2P approach based on the
principles of Distributed Hash Tables. We show that a dynamic
hierarchy of DHTs with on-demand classification of items can
positively influence the response time of queries while maintaining
lookup correctness.
RWTH Aachen University - Distributed Systems Group
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4116490&arnumber=4116594&count=192&index=90
http://web.archive.org/web/20061008091738/http://www.ieeelcn.org/
Print
IEEE Press
Proceedings of 31st IEEE Conference on Local Computer Networks (LCN 2006)
IEEE
Tampa, Florida, USA
31st IEEE Conference on Local Computer Networks (LCN 2006)
14-16 November 2006
en
1-4244-0418-5
10.1109/LCN.2006.322147
1
SimonRieche
KlausWehrle
LeoPetrak
ClemensWrzodek
techreport
200608riechetrmmog
Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games
2006
8
WSI-2006-04
Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive beta-testing suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world.
RWTH Aachen University - Distributed Systems Group
http://www.rieche.net/pdf/wsi-2006-04.pdf
Online
Tübingen, Germany
Wilhelm-Schickard-Institute for Computer Science, University of Tübingen
Technical Report
en
SimonRieche
MarcFouquet
HeikoNiedermayer
LeoPetrak
KlausWehrle
GeorgCarle
inproceedings
2006-heer-percomws-adapt-dht
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
2006
3
16
1
1-6
http://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2006-heer-percomws-dht-adhoc.pdf
Print
IEEE
Washington, DC, USA
In Proceedings of 3. IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P'06), Pisa, Italy.
Pisa, Italy
IEEE International Workshop on Mobile Peer-to-Peer Computing
March 2006
en
0-7695-2520-2
10.1109/PERCOMW.2006.16
1
TobiasHeer
StefanGötz
SimonRieche
KlausWehrle
poster
rieche2006poster
Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games
2006
3
Massively multiplayer online games (MMOGs) are becoming increasingly
popular today. However, even high-budget titles like World of
Warcraft that have gone through extensive beta-testing suffer from
downtimes because of hard- and software problems and lags on
overloaded servers. Our approach is to use structured P2P technology
for the server infrastructure of massively multiplayer online games
to improve reliability and scalability of these applications.
Structured P2P networks are able to adapt to the current state of
the game world and handle uneven distributions of the players. For
load balancing, we propose algorithms based on the virtual server
concept.
RWTH Aachen University - Distributed Systems Group
http://www.dagstuhl.de/de/programm/kalender/semhp/?semnr=06131
Print
Dagstuhl Seminar 06131 "Peer-to-Peer Systems and Applications"
Dagstuhl
Dagstuhl Seminar 06131
en
SimonRieche
KlausWehrle
inproceedings
landsiedel2005anonymous
Anonymous IP-Services via Overlay Routing
2005
3
Although research provides anonymous Internet communication schemes,
anonymous IP-services received only limited attention. In this paper
we present SARA (Anonymous Overlay Routing Providing Sender And
Receiver Anonymity), which enables sender, receiver and relationship
anonymity using layered encryption and distributed traffic mixes,
similar to a Chaumian Mix. Via IP-datagram service and address
virtualization it is fully transparent to applications. Organized as
structured Peer-To-Peer system, SARA is highly scalable and fault
tolerant.
In SARA each communication partner randomly selects a number of
nodes from the overlay and concatenates them to an anonymous
communication path. The sender selects the head of the path, the
receiver builds the tail and publishes this information in the
overlay network using an anonymous ID. Via this ID the sender
retrieves the tail nodes of the path and concatenates both path
section. Layered encryption hides the identities of the sender,
receiver and the intermediate nodes.
5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung"
Würzburg, Germany
5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung"
March 2005
OlafLandsiedel
SimonRieche
HeikoNiedermayer
KlausWehrle
GeorgCarle
inproceedings
petrak2005dienstguete
Dienstgüte in strukturierten hierarchischen Overlay Netzwerken
2005
3
Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005
Kaiserslautern, Germany
Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005
March 2005
LeoPetrak
SimonRieche
KlausWehrle
inproceedings
niedermayer2005distribution
On the Distribution of Nodes in Distributed Hash Tables
2005
3
Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005
Kaiserslautern, Germany
Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005
March 2005
HeikoNiedermayer
SimonRieche
KlausWehrle
GeorgCarle
inproceedings
200507riecheipgames
On the Use of Structured Peer-to-Peer Systems for Online Gaming
2005
3
Massively multiplayer games are becoming increasingly popular today. However, even high-budget titles suffer from downtimes because of hard- and software problems. Our approach is to use structured Peer-to-Peer technology for the server infrastructure of massively multiplayer online games, which improves reliability and scalability of these applications.
5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung"
Würzburg, Germany
5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung"
March 2005
SimonRieche
MarcFouquet
HeikoNiedermayer
KlausWehrle
GeorgCarle
inbook
200509riechep2pbookreliability
Reliability and Load Balancing in Distributed Hash Tables
2005
119-135
Ralf Steinmetz, Klaus Wehrle
Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS
9
Peer-to-Peer Systems and Applications
SimonRieche
HeikoNiedermayer
StefanGötz
KlausWehrle
inbook
200509goetzp2pbookdhtalgorithms
Selected Distributed Hash Table Algorithms
2005
95-117
Ralf Steinmetz, Klaus Wehrle
Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS
8
Peer-to-Peer Systems and Applications
StefanGötz
SimonRieche
KlausWehrle
inbook
200509wehrlep2pbookdhts
Distributed Hash Tables
2005
79-93
Ralf Steinmetz, Klaus Wehrle
Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS
7
Peer-to-Peer Systems and Applications
KlausWehrle
StefanGötz
SimonRieche
inproceedings
200503landsiedelfgsnaeon
Project AEON
2005
481
72-76
Power consumption is a crucial characteristic of sensor networks and their applications, as sensor nodes are commonly battery driven. Although recent research focuses strongly on energy aware applications and operating systems, power consumption is still a limiting factor. Once sensor nodes are deployed, it is challenging and sometimes even impossible to change batteries. As a result, erroneous lifetime prediction causes high costs and may render a sensor network useless, before its purpose is fulfilled. In this paper we present AEON, a novel evaluation tool to quantitatively predict power consumption of sensor nodes and whole sensor networks. Our energy model, based on measurements of node current draw and the execution of real code, enables accurate prediction of the actual power consumption of sensor nodes. Consequently, preventing erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency.
Zürich, CH
Proceedings of the 4th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Techical Report No. 481
OlafLandsiedel
KlausWehrle
SimonRieche
StefanGötz
LeoPetrak
conference
rieche2004thermaldissipation
A Thermal-Dissipation-based Approach for Balancing Data Load in Distributed Hash Tables
2004
11
15-23
A major objective of peer-to-peer (P2P) systems is the management of
large amounts of data distributed across many systems. Distributed
hash tables (DHT) are designed for highly scalable, self-organizing,
and efficient distribution and lookup of data, whereby data is
stored globally persistent. The range of values of the corresponding
hash function is partitioned and each interval is assigned to a node
of the DHT. Because the assignment of data to nodes is based on hash
functions, one assumes that the respective data load is distributed
evenly across all participating nodes. However most DHT show
difficulties with load balancing as we demonstrate in this paper. As
a solution for this problem, we present a new and very simple
approach for balancing stored data between peers in a fashion
analogous to the dissipation of heat energy in materials. We compare
this algorithm with other approaches for load balancing and present
results based on simulations and a prototype implementation. This
new algorithm improves the distribution of load in DHT without
requiring major changes of the DHT themselves. In addition, we show
that the fault tolerance of peer-to-peer systems is increased by the
proposed algorithm.
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=29935&arnumber=1367197&count=128&index=2
Print
IEEE Press
Proceedings of LCN 2004 – 29th IEEE Conference on Local Computer Networks
IEEE
Tampa, Florida, USA
LCN 2004 – 29th IEEE Conference on Local Computer Networks
November 2004
en
0-7695-2260-2
10.1109/LCN.2004.10
SimonRieche
LeoPetrak
KlausWehrle
inproceedings
200410riechehotp2preliability
Reliability of Data in Structured Peer-to-Peer Systems
2004
10
108-113
Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. For this purpose Distributed Hash Tables (DHT) offer a highly scalable and self-organizing paradigm for efficient distribution and retrieval of data. Thereby a common assumption of P2P-Systems is, that the participating nodes are unreliable and may fail at any time. Since many of research goes into the design of DHT lookup services, these systems aim to provide a stable global addressing structure. But to storage data reliable in a DHT only few techniques were already developed. However since data has to be stored persistent in the network, it should be retrieved anytime, even if nodes fail. In this work we discuss possibilities to store data fault tolerant in a structured Peer-to-Peer system.
Print
Proceedings of HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
Volendam, Netherlands
HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer
Oct. 2004
en
1
SimonRieche
KlausWehrle
OlafLandsiedel
StefanGötz
LeoPetrak
inproceedings
rieche2004comparison
Comparison of Load Balancing Algorithms for Structured Peer-to-Peer Systems
2004
9
51
Print
GI. LNI
Bonn, Germany
LNI
Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), GI-Jahrestagung Informatik 2004
Ulm, Germany
GI-Jahrestagung Informatik 2004
en
1
SimonRieche
LeoPetrak
KlausWehrle
inproceedings
2006-heer-gi2004
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
2004
9
51
239-244
Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics – namely scalability, flexibility, and resilience – they are quite interesting for being applied in ad-hoc networks. But, there are plenty of open questions concerning the applicability of Distributed Hash Tables in mobile ad-hoc scenarios: Do new problems arise when both technologies are used together? Are there any synergy effects when both technologies are combined? Are the results and assumptions, made for the infrastructural Internet, still true if a mobile ad-hoc network is used instead? In this paper, we discuss these and further questions and offer some solutions for using Distributed Hash Tables in ad-hoc networks.
Print
GI. LNI
Bonn, Germany
LNI
Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), GI-Jahrestagung Informatik 2004, Bonn, Germany
Ulm, Germany
GI-Jahrestagung Informatik 2004
en
3-88579-380-6
1
TobiasHeer
HeikoNiedermayer
LeoPetrak
SimonRieche
KlausWehrle
inproceedings
200410wehrlefgpcintegriertekonstruktionsmethode
Integrierte Konstruktionsmethoden für flexible Protokolle in ubiquitären Kommunikationssystemen
2004
Stuttgart, Germany
Proceedings of the GI/ITG KuVS Fachgespräch Systemsoftware für Pervasive Computing
KlausWehrle
OlafLandsiedel
SimonRieche
StefanGötz
LeoPetrak
inproceedings
1997-thissen-kivs-trader
Einbeziehung von Nutzerinteressen bei der QoS-basierten Dienstvermittlung unter CORBA
1997
236-251
Print
Springer
Proceedings der 10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97), Braunschweig, Germany
Braunschweig
10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97)
de
3-540-62565-8
1
PeterReichl
ClaudiaLinnhoff-Popien
DirkThißen
inproceedings
1996-thissen-dccn-trader
How to Enhance Service Selection in Distributed Systems
1996
114-123
Print
Proceedings of the 1st International Conference on Distributed Computer Communication Networks (DCCN'96), Tel Aviv, Isreal
Tel Aviv, Isreal
1st International Conference on Distributed Computer Communication Networks (DCCN'96)
en
PeterReichl
DirkThißen
ClaudiaLinnhoff-Popien