This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-19 Creation time: 15-12-32 --- Number of references 123 article 2024_pennekamp_supply-chain-survey An Interdisciplinary Survey on Information Flows in Supply Chains ACM Computing Surveys 2024 2 1 56 2 Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points. information flows; data communication; supply chain management; data security; data sharing; systematic literature review internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf ACM 0360-0300 10.1145/3606693 1 JanPennekamp RomanMatzutt ChristopherKlinkmüller LennartBader MartinSerror EricWagner SidraMalik MariaSpiß JessicaRahn TanGürpinar EduardVlad Sander J. J.Leemans Salil S.Kanhere VolkerStich KlausWehrle inproceedings 2023-wagner-lcn-repel Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols 2023 10 https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wagner-repel.pdf IEEE 48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US Daytona Beach, Florida, US IEEE Conference on Local Computer Networks (LCN) Oktober 1-5, 2023 accepted en 1 EricWagner NilsRothaug KonradWolsing LennartBader KlausWehrle MartinHenze inproceedings 2023_pennekamp_benchmarking_comparison Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking 2023 6 15 13901 489-505 Benchmarking is an essential tool for industrial organizations to identify potentials that allows them to improve their competitive position through operational and strategic means. However, the handling of sensitive information, in terms of (i) internal company data and (ii) the underlying algorithm to compute the benchmark, demands strict (technical) confidentiality guarantees—an aspect that existing approaches fail to address adequately. Still, advances in private computing provide us with building blocks to reliably secure even complex computations and their inputs, as present in industry benchmarks. In this paper, we thus compare two promising and fundamentally different concepts (hardware- and software-based) to realize privacy-preserving benchmarks. Thereby, we provide detailed insights into the concept-specific benefits. Our evaluation of two real-world use cases from different industries underlines that realizing and deploying secure information systems for industry benchmarking is possible with today's building blocks from private computing. Lecture Notes in Computer Science (LNCS), Volume 13901 real-world computing; trusted execution environments; homomorphic encryption; key performance indicators; benchmarking internet-of-production https://jpennekamp.de/wp-content/papercite-data/pdf/plv+23.pdf Springer Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain Zaragoza, Spain 35th International Conference on Advanced Information Systems Engineering (CAiSE '23) June 12-16, 2023 978-3-031-34559-3 0302-9743 10.1007/978-3-031-34560-9_29 1 JanPennekamp JohannesLohmöller EduardVlad JoschaLoos NiklasRodemann PatrickSapel Ina BereniceFink SethSchmitz ChristianHopmann MatthiasJarke GüntherSchuh KlausWehrle MartinHenze incollection 2023_pennekamp_crd-a.i Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead 2023 2 8 35-60 The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL. Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf Springer Interdisciplinary Excellence Accelerator Series Internet of Production: Fundamentals, Applications and Proceedings 978-3-031-44496-8 10.1007/978-3-031-44497-5_2 1 JanPennekamp AnastasiiaBelova ThomasBergs MatthiasBodenbenner AndreasBührig-Polaczek MarkusDahlmanns IkeKunze MoritzKröger SandraGeisler MartinHenze DanielLütticke BenjaminMontavon PhilippNiemietz LuciaOrtjohann MaximilianRudack Robert H.Schmitt UweVroomen KlausWehrle MichaelZeng incollection 2023_rueppel_crd-b2.ii Model-Based Controlling Approaches for Manufacturing Processes 2023 2 8 221-246 The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP). Process control; Model-based control; Data aggregation; Model identification; Model optimization internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf Springer Interdisciplinary Excellence Accelerator Series Internet of Production: Fundamentals, Applications and Proceedings 978-3-031-44496-8 10.1007/978-3-031-44497-5_7 1 Adrian KarlRüppel MuzafferAy BenediktBiernat IkeKunze MarkusLandwehr SamuelMann JanPennekamp PascalRabe Mark P.Sanders DominikScheurenberg SvenSchiller TiandongXi DirkAbel ThomasBergs ChristianBrecher UweReisgen Robert H.Schmitt KlausWehrle inproceedings 2022-rechenberg-cim Guiding Ship Navigators through the Heavy Seas of Cyberattacks 2022 10 Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183 https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf https://zenodo.org/record/7148794 Zenodo European Workshop on Maritime Systems Resilience and Security (MARESEC 2022) Bremerhaven, Germany 10.5281/zenodo.7148794 1 Merlinvon Rechenberg NinaRößler MariSchmidt KonradWolsing FlorianMotz MichaelBergmann ElmarPadilla JanBauer article 2022-jakobs-technologytransfer Too many or too few Standards Setters? Evidence from the Performance of Firms engaged in Standardization The Journal of Technology Transfer 2022 9 12 Theoretical models suggest that standardisation activities in the market may be too high or too low with respect to the market optimum. This paper investigates the association of standardisation engagement with firms'performance as indirect evidence of a sub-optimal level of market standardisation activities. Anecdotal evidence has it that firms can benefit from engagement in standardisation activities, but large quantitative studies on this topic are rather scarce. Based on a large innovation survey, this paper implements matching models to compare outcomes of firms with similar features but different standardisation activities. The outcomes of interest are several measures of innovation and growth. Standardisers and non-standardisers are matched onto a rich set of control variables. Firms engaged in standardisation have better innovation performance than firms with no such activities. However, the results for the performance measures are rather mixed, showing no association or negative association with labour productivity measures. Heteroscedasticity-based instruments mitigate possible endogeneity issues. These results can be interpreted as indirect evidence of low standardisation activity in the market, possibly due to long payback periods and appropriability issues of the standardisation investment. 10.1007/s10961-022-09951-z 1 Cesare Antonio FabioRiillo KaiJakobs article 2022_brauner_iop A Computer Science Perspective on Digital Transformation in Production ACM Transactions on Internet of Things 2022 5 1 3 2 The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality. Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf ACM 2691-1914 10.1145/3502265 1 PhilippBrauner ManuelaDalibor MatthiasJarke IkeKunze IstvánKoren GerhardLakemeyer MartinLiebenberg JudithMichael JanPennekamp ChristophQuix BernhardRumpe Wilvan der Aalst KlausWehrle AndreasWortmann MartinaZiefle techreport draft-irtf-coinrg-use-cases-02 Use Cases for In-Network Computing 2022 3 draft-irtf-coinrg-use-cases-02 expires: 8 September 2022 (work in progress) https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/ Online IETF Trust Internet Drafts Internet Engineering Task Force Internet Engineering Task Force IkeKunze KlausWehrle DirkTrossen Marie-JoséMontpetit Xavierde Foy DavidGriffin MiguelRio article 2022-wolsing-aistracks Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches Journal of Marine Science and Engineering 2022 1 14 10 1 The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, speed, and course of the sending vessels. AIS can thus serve as a tool to avoid collisions and increase onboard situational awareness. In recent years, AIS has been utilized in more and more applications since it enables worldwide surveillance of virtually any larger vessel and has the potential to greatly support vessel traffic services and collision risk assessment. Anomalies in AIS tracks can indicate events that are relevant in terms of safety and also security. With a plethora of accessible AIS data nowadays, there is a growing need for the automatic detection of anomalous AIS data. In this paper, we survey 44 research articles on anomaly detection of maritime AIS tracks. We identify the tackled AIS anomaly types, assess their potential use cases, and closely examine the landscape of recent AIS anomaly research as well as their limitations. automatic identification system; AIS; anomaly detection; maritime safety; maritime security; maritime surveillance https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-aistracks.pdf https://www.mdpi.com/2077-1312/10/1/112 en 10.3390/jmse10010112 1 KonradWolsing LinusRoepert JanBauer KlausWehrle article 2022-jakobs-ieeetem Luring European SMEs into ICT Standardization–Problems, Issues, and a Potential Way Forward IEEE Transactions on Engineering Management 2022 1-12 Common standards are essential for Information and Communication Technologies (ICT). Several studies suggest that (almost) all standardization working groups (WGs) are dominated by large firms and small and medium-sized enterprises (SMEs) and are typically marginalized. However, SMEs account for around 99% of all enterprises in the EU; their active participation in the standardization process would thus be crucial to develop ICT standards that meet the needs of the vast majority of their users. This article first discusses the current situation of SMEs in ICT standardization and the associated issues. Second, it conducts an econometric analysis to investigate the drivers of the use of ICT standards and engagement in ICT standardization based on a large and representative survey from Luxembourg. Regardless of their size, firms that actually and consciously deploy ICT standards in their core business are much more prepared to participate in standards-setting actively than those that do not. The article also proposes a way to exploit this correlation. The resulting implications for standards-setting organizations and policymakers are discussedn. 10.1109/TEM.2022.3226121 1 Cesare Antonio FabioRiillo KaiJakobs inproceedings 2021-kunze-spin-tracker Tracking the QUIC Spin Bit on Tofino 2021 12 7 15–21 https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-spin-tracker.pdf ACM Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ '21) 9781450391351 10.1145/3488660.3493804 1 IkeKunze ConstantinSander KlausWehrle JanRüth inproceedings 2021-krude-nfp-pred Determination of Throughput Guarantees for Processor-based SmartNICs 2021 12 7 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-krude-nfp-pred.pdf ACM The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21) 978-1-4503-9098-9/21/12 10.1145/3485983.3494842 1 JohannesKrude JanRüth DanielSchemmel FelixRath Iohannes-HeorhFolbort KlausWehrle inproceedings 2021-sander-shardingrevisited Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections? 2021 11 2 legato /fileadmin/papers/2021/2021-sander-sharding-revisited.pdf https://arxiv.org/abs/2110.14239 ACM Proceedings of the Internet Measurement Conference (IMC '21) Internet Measurement Conference 2021 02.11.21 - 04.11.21 978-1-4503-9129-0/21/11 10.1145/3487552.3487832 1 ConstantinSander LeoBlöcher KlausWehrle JanRüth inproceedings 2021_reuter_demo Demo: Traffic Splitting for Tor — A Defense against Fingerprinting Attacks 2021 9 14 Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis. Electronic Communications of the EASST, Volume 080 Onion Routing; Website Fingerprinting; Multipath Traffic; Privacy https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-reuter-splitting-demo.pdf TU Berlin Proceedings of the 2021 International Conference on Networked Systems (NetSys '21), September 13-16, 2021, Lübeck, Germany Lübeck, Germany September 13-16, 2021 1863-2122 10.14279/tuj.eceasst.80.1151 1 SebastianReuter JensHiller JanPennekamp AndriyPanchenko KlausWehrle inproceedings 2021-kunze-efm-evaluation L, Q, R, and T - Which Spin Bit Cousin Is Here to Stay? 2021 7 22 - 28 /fileadmin/papers/2021/2021-kunze-efm-evaluation.pdf ACM ANRW '21: Proceedings of the Applied Networking Research Workshop Virtual Event Applied Networking Research Workshop (ANRW '21) July 2021 10.1145/3472305.3472319 1 IkeKunze KlausWehrle JanRüth inproceedings 2021-glebke-service-based-forwarding Service-based Forwarding via Programmable Dataplanes 2021 6 10 reflexes /fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf IEEE Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21) 978-1-6654-4005-9 2325-5609 10.1109/HPSR52026.2021.9481814 1 RenéGlebke DirkTrossen IkeKunze DavidLou JanRüth MirkoStoffers KlausWehrle inproceedings 2021-kunze-aqm-tofino-p4 Tofino + P4: A Strong Compound for AQM on High-Speed Networks? 2021 5 72-80 internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf IFIP/IEEE Proceedings of the International Symposium on Integrated Network Management (IM '21) Virtual Event International Symposium on Integrated Network Management (IM '21) May 2021 978-1-7281-9041-9 1 IkeKunze MoritzGunz DavidSaam KlausWehrle JanRüth inproceedings 2021-sander-zoom-cc Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM 2021 3 internet-of-production /fileadmin/papers/2021/2021-sander-zoom-fairness-aqm.pdf https://arxiv.org/abs/2107.00904 Springer Proceedings of the Passive and Active Measurement Conference (PAM '21) Passive and Active Measurement Conference (PAM 2021) 10.1007/978-3-030-72582-2_1 1 ConstantinSander IkeKunze KlausWehrle JanRüth inproceedings 2021-jacobs-euras-sme Luring SMEs into ICT Standardisation 2021 16 459-478 Kai Jakobs Mainz Publishers EURAS Contributions to Standardisation Research Joint Proceedings: Standardisation and Innovation (EURAS 2021) and The Past, Present and Future of ICT Standardisation (SIIT 2021) 25th EURAS Annual Standardisation Conference and 11th International Conference on Standardisation and Innovation in Information Technology (SIIT) 1 Cesare Antonio FabioRiillo KaiJakobs inproceedings 2021-jakobs-euras-standard Too Much or Too Little Standardization? - The performance of firms engaged in standardization 2021 16 479-498 Kai Jakobs Mainz Publishers EURAS Contributions to Standardisation Research Joint Proceedings: Standardisation and Innovation (EURAS 2021) and The Past, Present and Future of ICT Standardisation (SIIT 2021) 25th EURAS Annual Standardisation Conference and 11th International Conference on Standardisation and Innovation in Information Technology (SIIT) 1 Cesare Antonio FabioRiillo KaiJakobs inproceedings 2020_pennekamp_benchmarking Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking 2020 12 15 31-44 Benchmarking the performance of companies is essential to identify improvement potentials in various industries. Due to a competitive environment, this process imposes strong privacy needs, as leaked business secrets can have devastating effects on participating companies. Consequently, related work proposes to protect sensitive input data of companies using secure multi-party computation or homomorphic encryption. However, related work so far does not consider that also the benchmarking algorithm, used in today's applied real-world scenarios to compute all relevant statistics, itself contains significant intellectual property, and thus needs to be protected. Addressing this issue, we present PCB — a practical design for Privacy-preserving Company Benchmarking that utilizes homomorphic encryption and a privacy proxy — which is specifically tailored for realistic real-world applications in which we protect companies' sensitive input data and the valuable algorithms used to compute underlying key performance indicators. We evaluate PCB's performance using synthetic measurements and showcase its applicability alongside an actual company benchmarking performed in the domain of injection molding, covering 48 distinct key performance indicators calculated out of hundreds of different input values. By protecting the privacy of all participants, we enable them to fully profit from the benefits of company benchmarking. practical encrypted computing; homomorphic encryption; algorithm confidentiality; benchmarking; key performance indicators; industrial application; Internet of Production internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-company-benchmarking.pdf https://eprint.iacr.org/2020/1512 HomomorphicEncryption.org Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event Virtual Event December 15, 2020 978-3-00-067798-4 10.25835/0072999 1 JanPennekamp PatrickSapel Ina BereniceFink SimonWagner SebastianReuter ChristianHopmann KlausWehrle MartinHenze inproceedings 2020_delacadena_trafficsliver TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting 2020 11 12 1971-1985 Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction of packets. By collecting traffic traces at a malicious Tor entry node — one of the weakest adversaries in the attacker model of Tor — a passive eavesdropper can leverage the captured meta-data to reveal the websites visited by a Tor user. As recently shown, WFP is significantly more effective and realistic than assumed. Concurrently, former WFP defenses are either infeasible for deployment in real-world settings or defend against specific WFP attacks only. To limit the exposure of Tor users to WFP, we propose novel lightweight WFP defenses, TrafficSliver, which successfully counter today’s WFP classifiers with reasonable bandwidth and latency overheads and, thus, make them attractive candidates for adoption in Tor. Through user-controlled splitting of traffic over multiple Tor entry nodes, TrafficSliver limits the data a single entry node can observe and distorts repeatable traffic patterns exploited by WFP attacks. We first propose a network-layer defense, in which we apply the concept of multipathing entirely within the Tor network. We show that our network-layer defense reduces the accuracy from more than 98% to less than 16% for all state-of-the-art WFP attacks without adding any artificial delays or dummy traffic. We further suggest an elegant client-side application-layer defense, which is independent of the underlying anonymization network. By sending single HTTP requests for different web objects over distinct Tor entry nodes, our application-layer defense reduces the detection rate of WFP classifiers by almost 50 percentage points. Although it offers lower protection than our network-layer defense, it provides a security boost at the cost of a very low implementation overhead and is fully compatible with today’s Tor network. Traffic Analysis; Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-delacadena-trafficsliver.pdf https://github.com/TrafficSliver ACM Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS '20), November 9-13, 2020, Orlando, FL, USA Virtual Event, USA November 9-13, 2020 978-1-4503-7089-9/20/11 10.1145/3372297.3423351 1 WladimirDe la Cadena AsyaMitseva JensHiller JanPennekamp SebastianReuter JulianFilter KlausWehrle ThomasEngel AndriyPanchenko phdthesis 2020-rueth-phd-thesis Measuring the Evolution of the Internet in the Age of Giants 2020 11 https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-7660-8 Shaker Verlag
Shaker Verlag, Düren, Germany
Reports on Communications and Distributed Systems 20 RWTH Aachen University Ph.D. Thesis 978-3-8440-7660-8 JanRüth
article 2020-holz-ccr-tls13 Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization ACM SIGCOMM Computer Communications Review (CCR) 2020 7 50 3 3-15 Selected for the 'Best of CCR' session at SIGCOMM 2021. https://ccronline.sigcomm.org/wp-content/uploads/2020/08/sigcomm-ccr-paper430-with-open-review.pdf Association for Computing Machinery
New York, NY, USA
10.1145/3411740.3411742 1 RalphHolz JensHiller JohannaAmann AbbasRazaghpanah ThomasJost NarseoVallina-Rodriguez OliverHohlfeld
inproceedings 2020-schemmel-porse Symbolic Partial-Order Execution for Testing Multi-Threaded Programs 2020 7 symbiosys https://arxiv.org/pdf/2005.06688.pdf https://arxiv.org/abs/2005.06688 Computer Aided Verification (CAV 2020) 32nd International Conference on Computer Aided Verification 10.1007/978-3-030-53288-8_18 1 DanielSchemmel JulianBüning CésarRodríguez DavidLaprell KlausWehrle inproceedings 2020-mann-ur-weldseamstudy Study on weld seam geometry control for connected gas metal arc welding systems 2020 6 https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf Proceedings of the 2020 Internal Conference on Ubiquitous Robots Internal Conference on Ubiquitous Robots June 22-26, 2020 10.1109/UR49135.2020.9144839 1 SamuelMann RenéGlebke IkeKunze DominikScheurenberg RahulSharma UweReisgen KlausWehrle DirkAbel inproceedings 2020_roepert_opcua Assessing the Security of OPC UA Deployments 2020 4 2 To address the increasing security demands of industrial deployments, OPC UA is one of the first industrial protocols explicitly designed with security in mind. However, deploying it securely requires a thorough configuration of a wide range of options. Thus, assessing the security of OPC UA deployments and their configuration is necessary to ensure secure operation, most importantly confidentiality and integrity of industrial processes. In this work, we present extensions to the popular Metasploit Framework to ease network-based security assessments of OPC UA deployments. To this end, we discuss methods to discover OPC UA servers, test their authentication, obtain their configuration, and check for vulnerabilities. Ultimately, our work enables operators to verify the (security) configuration of their systems and identify potential attack vectors. internet-of-production, rfc https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-roepert-opcua-security.pdf en University of Tübingen Proceedings of the 1st ITG Workshop on IT Security (ITSec '20), April 2-3, 2020, Tübingen, Germany Tübingen, Germany April 2-3, 2020 10.15496/publikation-41813 1 LinusRoepert MarkusDahlmanns Ina BereniceFink JanPennekamp MartinHenze article 2020_mann_welding_layers Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers Advanced Structured Materials 2020 4 1 125 101-118 A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production. Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19) Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy Internet-of-Production https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf Springer Ponta Delgada, Azores, Portugal October 24-25, 2019 978-981-15-2956-6 1869-8433 10.1007/978-981-15-2957-3_8 1 SamuelMann JanPennekamp TobiasBrockhoff AnahitaFarhang MahsaPourbafrani LukasOster Merih SeranUysal RahulSharma UweReisgen KlausWehrle Wilvan der Aalst inproceedings 2020-kosek-tcp-conformance MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild 2020 3 30 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf https://arxiv.org/abs/2002.05400 Springer Proceedings of the Passive and Active Measurement Conference (PAM '20) Eugene, Oregon, USA Passive and Active Measurement Conference (PAM 2020) 30.03.2020 - 31.03.2020 en https://doi.org/10.1007/978-3-030-44081-7_8 1 MikeKosek LeoBlöcher JanRüth TorstenZimmermann OliverHohlfeld article 2020-wehrle-digitalshadows Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus Der Profilbereich "Information & Communication Technology" 2020 0179-079X 10.18154/RWTH-2021-02496 MatthiasJarke Wilvan der Aalst ChristianBrecher MatthiasBrockmann IstvánKoren GerhardLakemeyer BernhardRumpe GüntherSchuh KlausWehrle MartinaZiefle article 2019-kunze-ccwild-tnsm Congestion Control in the Wild - Investigating Content Provider Fairness IEEE Transactions on Network and Service Management 2019 12 27 17 2 1224 - 1238 https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-kunze-ccwild-tnsm.pdf 1932-4537 10.1109/TNSM.2019.2962607 1 IkeKunze JanRüth OliverHohlfeld inproceedings 2019-glebke-in-network-cv Towards Executing Computer Vision Functionality on Programmable Network Devices 2019 12 9 reflexes,maki,internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf Online ACM 1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19) en 978-1-4503-7000-4/19/12 10.1145/3359993.3366646 1 RenéGlebke JohannesKrude IkeKunze JanRüth FelixSenger KlausWehrle inproceedings 2019-rueth-quic-userstudy Perceiving QUIC: Do Users Notice or Even Care? 2019 12 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-quic-userstudy.pdf https://arxiv.org/abs/1910.07729 ACM In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19) Orlando, Florida, USA International Conference on emerging Networking EXperiments and Technologies 9.12.2019-12.12.2019 10.1145/3359989.3365416 1 JanRüth KonradWolsing KlausWehrle OliverHohlfeld inproceedings 2019_pennekamp_multipath Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing 2019 10 7 Users of an onion routing network, such as Tor, depend on its anonymity properties. However, especially malicious entry nodes, which know the client’s identity, can also observe the whole communication on their link to the client and, thus, conduct several de-anonymization attacks. To limit this exposure and to impede corresponding attacks, we propose to multipath traffic between the client and the middle node to reduce the information an attacker can obtain at a single vantage point. To facilitate the deployment, only clients and selected middle nodes need to implement our approach, which works transparently for the remaining legacy nodes. Furthermore, we let clients control the splitting strategy to prevent any external manipulation. Poster Session https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-multipathing.pdf IEEE Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA Chicago, IL, USA 27th IEEE International Conference on Network Protocols (ICNP 2019) 7-10. Oct. 2019 978-1-7281-2700-2 2643-3303 10.1109/ICNP.2019.8888029 1 JanPennekamp JensHiller SebastianReuter WladimirDe la Cadena AsyaMitseva MartinHenze ThomasEngel KlausWehrle AndriyPanchenko inproceedings 2019-sander-depcci DeePCCI: Deep Learning-based Passive Congestion Control Identification 2019 8 18 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf https://arxiv.org/abs/1907.02323 ACM In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI '19) Beijing, China Workshop on Network Meets AI & ML 18.08.2019 10.1145/3341216.3342211 1 ConstantinSander JanRüth OliverHohlfeld KlausWehrle inproceedings 2019-wolsing-quicperf A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC 2019 7 22 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wolsing-quicperf.pdf https://arxiv.org/abs/1906.07415 ACM In Proceedings of the Applied Networking Research Workshop (ANRW '19) Montreal, Quebec, Canada Applied Networking Research Workshop at IETF-105 2019-07-22 10.1145/3340301.3341123 1 KonradWolsing JanRüth KlausWehrle OliverHohlfeld inproceedings 2019-hohlfeld-bpfperf Demystifying the Performance of XDP BPF 2019 6 25 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf IEEE IEEE International Conference on Network Softwarization (NetSoft) IEEE International Conference on Network Softwarization 10.1109/NETSOFT.2019.8806651 1 OliverHohlfeld JohannesKrude Jens HelgeReelfs JanRüth KlausWehrle inproceedings 2019-rueth-ccfness An Empirical View on Content Provider Fairness 2019 6 19 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-ccfness.pdf https://arxiv.org/abs/1905.07152 IFIP/IEEE In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19) Paris, France Network Traffic Measurement and Analysis Conference 19.06.2019 - 21.06.2019 10.23919/TMA.2019.8784684 1 JanRüth IkeKunze OliverHohlfeld inproceedings ReelfsMHH2019 Hashtag Usage in a Geographically-Local Microblogging App 2019 5 13 919-927 Anonymous Messaging; Location Based Messaging; User Behavior and Engagement; Information Diffusion; Hashtag comtex https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-reelfs-jodel-hashtags.pdf ACM Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA San Francisco, California, USA International Workshop on Location and the Web May 13–17, 2019 978-1-4503-6675-5/19/05 10.1145/3308560.3316537 1 HelgeReelfs TimonMohaupt OliverHohlfeld NiklasHenckell inproceedings 2019_pennekamp_infrastructure Towards an Infrastructure Enabling the Internet of Production 2019 5 8 31-37 New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP. Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration internet-of-production https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf IEEE Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW Taipei, TW May 6-9, 2019 978-1-5386-8500-6/19 10.1109/ICPHYS.2019.8780276 1 JanPennekamp RenéGlebke MartinHenze TobiasMeisen ChristophQuix RihanHai LarsGleim PhilippNiemietz MaximilianRudack SimonKnape AlexanderEpple DanielTrauth UweVroomen ThomasBergs ChristianBrecher AndreasBührig-Polaczek MatthiasJarke KlausWehrle techreport 2019-rueth-blitzstart Blitz-starting QUIC Connections 2019 5 8 arXiv:1905.03144 [cs.NI] 1--8 https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf https://arxiv.org/abs/1905.03144 Online COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University Technical Report en JanRüth KonradWolsing MartinSerror KlausWehrle OliverHohlfeld
techreport 2019-hohlfeld-santa-tr Application-Agnostic Offloading of Packet Processing 2019 4 1 arXiv:1904.00671 [cs.NI] 1--14 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf https://arxiv.org/abs/1904.00671 Online COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University Technical Report en OliverHohlfeld HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle
inproceedings 2019-rueth-icmp Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane 2019 3 27 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf https://arxiv.org/abs/1901.07265 Springer In Proceedings of the Passive and Active Measurement Conference (PAM '19) Puerto Varas, Chile Passive and Active Measurement Conference (PAM 2019) 27.3.2018 - 29.3.2018 en 10.1007/978-3-030-15986-3_4 1 JanRüth TorstenZimmermann OliverHohlfeld inproceedings 2019-glebke-wirelessgain Enabling Wireless Network Support for Gain Scheduled Control 2019 3 25 reflexes,spp https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf ACM In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019) Dresden, Germany International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019) 25.03.2019 10.1145/3301418.3313943 1 SebastianGallenmüller RenéGlebke StephanGünther EricHauser MauriceLeclaire StefanReif JanRüth AndreasSchmidt GeorgCarle ThorstenHerfet WolfgangSchröder-Preikschat KlausWehrle article rueth:iw:TNSM19 TCP’s Initial Window – Deployment in the Wild and its Impact on Performance IEEE Transactions on Network and Service Management 2019 1 30 16 2 389--402 maki http://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf 1932-4537 10.1109/TNSM.2019.2896335 1 JanRüth IkeKunze OliverHohlfeld proceedings 2018-QuicTesting Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution 2018 12 4 erc,symbiosys https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rath-quictesting.pdf https://dl.acm.org/citation.cfm?id=3284853 https://arxiv.org/abs/1811.12099 ACM Heraklion, Greece EPIQ'18 Workshop Paper 4.12.2018 en 978-1-4503-6082-1 10.1145/3284850.3284853 1 FelixRath DanielSchemmel KlausWehrle inproceedings 2018-rueth-mining Digging into Browser-based Crypto Mining 2018 10 31 maki,internet-measurements http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf https://arxiv.org/abs/1808.00811 ACM Proceedings of the Internet Measurement Conference (IMC '18) Boston, US Internet Measurement Conference 2018 31.10.18 - 2.11.18 en 10.1145/3278532.3278539 1 JanRüth TorstenZimmermann KonradWolsing OliverHohlfeld inproceedings 2018-hiller-lcn-lowlatencyiiot Secure Low Latency Communication for Constrained Industrial IoT Scenarios 2018 10 connect,iop,nerd-nrw https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-lcn-secure_low_latency_communication_iiot.pdf IEEE 43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA Chicago, USA 43nd IEEE Conference on Local Computer Networks (LCN) October 1-4, 2018 en 978-1-5386-4413-3 10.1109/LCN.2018.8638027 1 JensHiller MartinHenze MartinSerror EricWagner Jan NiklasRichter KlausWehrle inproceedings 2018-hohlfeld-santa Application-Agnostic Offloading of Datagram Processing 2018 9 3 maki,ssiclops,reflexes https://ieeexplore.ieee.org/document/8493053 IEEE Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria Vienna, Austria International Teletraffic Congress ITC 30 03.09.2018 - 07-09.2018 en 10.1109/ITC30.2018.00015 1 OliverHohlfeld Jens HelgeReelfs JanRüth FlorianSchmidt TorstenZimmermann JensHiller KlausWehrle inproceedings 2018-rueth-reflexnetcompute Towards In-Network Industrial Feedback Control 2018 8 20 reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexnetcompute.pdf ACM Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18) Budapest, Hungary ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute 2018) 20.08.2018 10.1145/3229591.3229592 1 JanRüth RenéGlebke KlausWehrle VedadCausevic SandraHirche inproceedings 2018-rueth-iwcdns Demystifying TCP Initial Window Configurations of Content Distribution Networks 2018 6 26 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-iwcdns.pdf https://arxiv.org/abs/1902.08937 http://tma.ifip.org/2018/wp-content/uploads/sites/3/2018/06/tma2018_paper13.pdf In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18) Vienna, Austria Network Traffic Measurement and Analysis Conference (TMA'18) 26.06.2018 - 29.06.2018 10.23919/TMA.2018.8506549 1 JanRüth OliverHohlfeld inproceedings 2018-rueth-reflexdemo Demo: Towards In-Network Processing for Low-Latency Industrial Control 2018 4 15 reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexdemo.pdf IEEE Computer Society In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Honolulu, HI, USA International Conference on Computer Communications (INFOCOM) 15.04.2018 - 19.04.2018 en 10.1109/INFCOMW.2018.8406844 1 JanRüth RenéGlebke TanjaUlmen KlausWehrle inproceedings 2018-rueth-quicadoptionstudy A First Look at QUIC in the Wild 2018 3 26 255-268 maki,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-quicadoptionstudy.pdf https://arxiv.org/abs/1801.05168 Springer, Cham In Proceedings of the Passive and Active Measurement Conference (PAM '18) Berlin, Germany Passive and Active Measurement Conference (PAM 2018) 26.3.2018 - 27.3.2018 en 978-3-319-76481-8 10.1007/978-3-319-76481-8_19 1 JanRüth IngmarPoese ChristophDietzel OliverHohlfeld inproceedings 2018-tzimmermann-metacdn Characterizing a Meta-CDN 2018 3 26 114-128 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf https://arxiv.org/abs/1803.09990 Springer, Cham In Proceedings of the Passive and Active Measurement Conference (PAM '18) Berlin, Germany Passive and Active Measurement Conference (PAM 2018) 26.3.2018 - 27.3.2018 en 978-3-319-76480-1 10.1007/978-3-319-76481-8_9 1 OliverHohlfeld JanRüth KonradWolsing TorstenZimmermann inproceedings 2018-tzimmermann-split SPLIT: Smart Protocol Loading for the IoT 2018 2 14 iop https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf https://dl.acm.org/citation.cfm?id=3234847.3234854 ACM Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain Madrid, Spain European Conference on Wireless Sensor Networks (EWSN 2018) 14.2.2018 - 16.2.2018 en 978-0-9949886-2-1 1 TorstenZimmermann JensHiller Jens HelgeReelfs PascalHein KlausWehrle inproceedings 2017-poormohammady Dynamic Algorithm Selection for the Logic of Tasks in IoT Stream Processing Systems 13th International Conference on Network and Service Management 2017 11 26 Online IEEE 13th International Conference on Network and Service Management, Tokyo, Japan en 10.23919/CNSM.2017.8256009 1 EhsanPoormohammady Jens HelgeReelfs MirkoStoffers KlausWehrle ApostolosPapageorgiou inproceedings 2017-rueth-iwmeasure Large-Scale Scanning of TCP’s Initial Window 2017 11 1 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf ACM In Proceedings of the Internet Measurement Conference (IMC '17) London, UK Proceedings of the 2017 Internet Measurement Conference 01.11.2017 - 03.11.2017 en 10.1145/3131365.3131370 1 JanRüth ChristianBormann OliverHohlfeld conference 2017-fink-brainlab-gmds BrainLab - Ein Framework für mobile neurologische Untersuchungen 2017 8 29 Best Abstract Award https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml 06.09.19 German Medical Science GMS Publishing House (2017) 62. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS). Oldenburg GMDS 2017 17-21 September 2017 10.3205/17gmds137 1 Ina BereniceFink BerndHankammer ThomasStopinski YannicTitgemeyer RoannRamos EkaterinaKutafina Jó AgilaBitsch Stephan MichaelJonas proceedings 2017-SymPerfPoster SymPerf: Predicting Network Function Performance 2017 8 21 spp,erc,symbiosys,reflexes https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf ACM Los Angeles, USA ACM SIGCOMM 2017 Poster 21.8.2017 - 25.8.2017 en 978-1-4503-5057-0/17/08 10.1145/3123878.3131977 1 FelixRath JohannesKrude JanRüth DanielSchemmel OliverHohlfeld Jó AgilaBitsch Link KlausWehrle inproceedings 2017-zimmermann-networking-http2 How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push 2017 6 12 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf IEEE Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden Stockholm, Sweden IFIP Networking 2017 12.-16.6.2017 978-3-901882-94-4 10.23919/IFIPNetworking.2017.8264830 1 TorstenZimmermann JanRüth BenediktWolters OliverHohlfeld article dombrowski-vdi Funktechnologien für Industrie 4.0 VDE Positionspapier 2017 6 1 VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.
Stresemannallee 15, 60596 Frankfurt am Main, Germany
IsmetAktas AlexanderBentkus FlorianBonanati ArminDekorsy ChristianDombrowski MichaelDoubrava AliGolestani FrankHofmann MikeHeidrich StefanHiensch RüdigerKays MichaelMeyer AndreasMüller Stephanten Brink NedaPetreska MilanPopovic LutzRauchhaupt AhmadSaad HansSchotten ChristophWöste IngoWolff
conference 2017-fink-brainlab BrainLab – towards mobile brain research 2017 4 24 2 /fileadmin/papers/2017/2017-fink-brainlab.pdf http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf 2017-05-09 Online Informatics for Health 2017, Manchester UK Manchester, UK Informatics for Health 2017, Manchester UK 24-26 April 2017 en 1 Ina BereniceFink BerndHankammer ThomasStopinsky RoannRamos EkaterinaKutafina Jó AgilaBitsch Link StephanJonas inproceedings 2017-ziegeldorf-codaspy-priward Privacy-Preserving HMM Forward Computation 2017 3 22 83-94 mynedata https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf Online ACM Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA en 978-1-4503-4523-1 10.1145/3029806.3029816 1 Jan HenrikZiegeldorf JanMetzke JanRüth MartinHenze KlausWehrle incollection 2016-iiot-rueth-comm Communication and Networking for the Industrial Internet of Things 2017 317-346 Online Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B. Springer Industrial Internet of Things en 978-3-319-42558-0 10.1007/978-3-319-42559-7_12 1 JanRüth FlorianSchmidt MartinSerror KlausWehrle TorstenZimmermann inproceedings 2016-henze-cloudcom-trinics Towards Transparent Information on Individual Cloud Service Usage 2016 12 12 366-370 trinics https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf Online IEEE Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg en 978-1-5090-1445-3 10.1109/CloudCom.2016.0064 1 MartinHenze DanielKerpen JensHiller MichaelEggert DavidHellmanns ErikMühmer OussamaRenuli HenningMaier ChristianStüble RogerHäußling KlausWehrle inproceedings 2016-matzutt-ccs-bitcoin POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store 2016 10 24 1769-1771 mynedata /fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf Online ACM Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria en 978-1-4503-4139-4 10.1145/2976749.2989059 1 RomanMatzutt OliverHohlfeld MartinHenze RobinRawiel Jan HenrikZiegeldorf KlausWehrle article 2015-cheng-piap-jmu Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening JMIR Mhealth Uhealth 2016 7 20 4 3 e88 piap http://mhealth.jmir.org/2016/3/e88/ http://www.ncbi.nlm.nih.gov/pubmed/27439444 Online en 2291-5222 10.2196/mhealth.5284 1 Paula Glenda FerrerCheng Roann MunozRamos Jó AgilaBitsch Link Stephan MichaelJonas TimIx Portia Lynn QuetulioSee KlausWehrle inproceedings 2016-ramos-inpact-lexicon How Do I Say "Sad?" Building a Depression-Lexicon for Psychologist in a Pocket 2016 4 30 1--6 29% Acceptance rate /fileadmin/misc/2016/2016-ramos-inpact-lexicon.pdf http://inpact-psychologyconference.org/2016/conference-program/ Online Clara Pracana and Michael Wang World Institute for Advanced Research and Science
Lisbon, Portugal
Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016) Lisbon, Portugal International Psychological Applications Conference and Trends (InPACT 2016) April 30 -- May 2, 2016 en 978-989-99389-6-0 1 Roann MunozRamos Paula Glenda FerrerCheng Jó AgilaBitsch Link Stephan MichaelJonas
inproceedings 2016-ramos-inpact-feeling-meh Feeling Meh: Psychologist in a pocket app for depression screening 2016 4 30 1--4 29% Acceptance rate /fileadmin/misc/2016/2016-ramos-inpact-feeling-meh.pdf http://inpact-psychologyconference.org/2016/conference-program/ Online Clara Pracana and Michael Wang World Institute for Advanced Research and Science
Lisbon, Portugal
Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016) Lisbon, Portugal International Psychological Applications Conference and Trends (InPACT 2016) April 30 -- May 2, 2016 en 978-989-99389-6-0 1 Roann MunozRamos Paula Glenda FerrerCheng Jó AgilaBitsch Link Stephan MichaelJonas
article 2016-fgcs-henze-iotprivacy A Comprehensive Approach to Privacy in the Cloud-based Internet of Things Future Generation Computer Systems 2016 3 56 701-718 ipacs https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-fgcs-iotprivacy.pdf Online Elsevier en 0167-739X 10.1016/j.future.2015.09.016 1 MartinHenze LarsHermerschmidt DanielKerpen RogerHäußling BernhardRumpe KlausWehrle inproceedings 2016-zimmermann-wons-mirco Maintaining Integrity and Reputation in Content Offloading 2016 1 25-32 maki http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-zimmermann-wons-mirco.pdf IEEE 12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy Cortina d'Ampezzo, Italy 12th International Conference on Wireless On-demand Network Systems and Services (WONS) January 20 - 22 2016 en 978-3-901882-80-7 1 TorstenZimmermann JanRüth HannoWirtz KlausWehrle inproceedings 2015-wirtz-secon Enabling Ubiquitous Interaction with Smart Things 2015 6 24 256-264 maki https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf http://www.comsys.rwth-aachen.de/short/secon15-stif Online IEEE 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA Seattle, USA 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015) 22.06.2015 - 25.06.2015 en 10.1109/SAHCN.2015.7338324 1 HannoWirtz JanRüth MartinSerror TorstenZimmermann KlausWehrle inproceedings 2015-bitsch-phealth-piap Psychologist in a Pocket: Towards Depression Screening on Mobile Phones 2015 6 2 211 153 --159 Depression is the most prevalent clinical disorder and one of the main causes of disability. This makes early detection of depressive symptoms critical in its prevention and management. This paper presents and discusses the development of Psychologist in a Pocket (PiaP), a mental mHealth application for Android which screens and monitors for these symptoms, and–given the explicit permission of the user–alerts a trusted contact such as the mental health professional or a close friend, if it detects symptoms. All text inputted electronically–such as short message services, emails, social network posts–is analyzed based on keywords related to depression based on DSM-5 and ICD criteria as well as Beck's Cognitive Theory of Depression and the Self-Focus Model. Data evaluation and collection happen in the background, on- device, without requiring any user involvement. Currently, the application is in an early prototype phase entering initial clinical validation. fileadmin/papers/2015/2015-bitsch-phealth-piap.pdf Print Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin IOS Press
Amsterdam
Studies in Health Technology and Informatics Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health Västerås, Sweden 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health June 2-4, 2015 en 978-1-61499-515-9 0926-9630 10.3233/978-1-61499-516-6-153 1 Jó AgilaBitsch Link RoannRamos TimIx Paula GlendaFerrer Cheng KlausWehrle
inproceedings 2015-bitsch-phealth-brain Towards Brain Research in a Pocket: Bringing EEG Research and Diagnostics out of the Lab 2015 6 2 211 185 -- 190 Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment. We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach. fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf Print Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin IOS Press
Amsterdam
Studies in Health Technology and Informatics Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health Västerås, Sweden 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health June 2-4, 2015 en 978-1-61499-515-9 0926-9630 10.3233/978-1-61499-516-6-185 1 Jó AgilaBitsch Link RoannRamos CassandraSeverijns KlausWehrle
incollection 2013-wtc-eggert-sensorcloud SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators 2014 12 14 203-218 sensorcloud fileadmin/papers/2013/2013-wtc-eggert-sensorcloud.pdf Online Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard Springer Trusted Cloud Computing en 978-3-319-12717-0 10.1007/978-3-319-12718-7_13 1 MichaelEggert RogerHäußling MartinHenze LarsHermerschmidt RenéHummen DanielKerpen AntonioNavarro Pérez BernhardRumpe DirkThißen KlausWehrle inproceedings 2014-wirtz-mum-dcmv Facilitating Direct and Ubiquitous Mobile Computer Vision 2014 11 27 fileadmin/papers/2014/2014-wirtz-mum-mcv.pdf Online ACM The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014), Melbourne, Australia Melbourne, Australia The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014) en 978-1-4503-3304-7 10.1145/2677972.2677974 1 HannoWirtz JanRüth KlausWehrle inproceedings 2014-chants-wirtz-disco Opportunistic Interaction in the Challenged Internet of Things 2014 9 7 1-8 fileadmin/papers/2014/2014-wirtz-chants-challenged_iot.pdf online ACM Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, USA Maui, Hawaii, USA Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014) 7 September 2014 en 978-1-4503-3071-8 10.1145/2645672.2645679 1 HannoWirtz JanRüth MartinSerror Jó AgilaBitsch Link KlausWehrle inproceedings 2014-ficloud-henze-upecsi User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things 2014 8 27 191-196 ipacs /fileadmin/papers/2014/2014-ficloud-henze-upecsi.pdf Online IEEE 2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain Barcelona, Spain 2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014) en 978-1-4799-4357-9 10.1109/FiCloud.2014.38 1 MartinHenze LarsHermerschmidt DanielKerpen RogerHäußling BernhardRumpe KlausWehrle inproceedings 2014-bitsch-extremecom-demo Demo: Opportunistic Mobile Brain Research 2014 8 14 1--2 The majority of research using brain imaging and EEG techniques is currently limited to clinical environments, restricting experiments to synthetic tasks in controlled conditions. Lifting these limitations brought about by this artificial set-up would allow us to perform neuropsychological assessments and research in mobile settings or at locations easier accessible to patients, possibly even in remote, hard to access areas. We developed a tablet based mobile framework to present auditory and visual stimuli, capture wireless commercial EEG and screen interaction data, and analyze the recorded data for immediate evaluation, as well as share the data over internet or local opportunistic links. To demonstrate the feasibility of our approach, we successfully replicated the experimental set-up and evaluation pipeline of two existing EEG studies on event-related potentials. This work therefore lays the foundation to further truly mobile brain research and health-care applications. fileadmin/papers/2014/2014-bitsch-extremcom-mobile-eeg-demo.pdf Online Hui, Pan and Lindgren, Anders ACM Proceedings of the 6th Extreme Conference on Communication Galapagos Islands, Ecuador 6th Extreme Conference on Communication August 11-15, 2014 en 978-1-4503-2929-3 1 Jó AgilaBitsch Link RoannRamos DavidOrlea KlausWehrle inproceedings 2014-hummen-delegation Delegation-based Authentication and Authorization for the IP-based Internet of Things 2014 6 30 284-292 iotsec; sensorcloud http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf Online IEEE 11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014) Singapore 11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014) 30.06. - 03.07.2014 en 10.1109/SAHCN.2014.6990364 1 RenéHummen HosseinShafagh ShahidRaza ThiemoVoigt KlausWehrle inproceedings 2014-mobisys-rueth-uiso Demo: Ubiquitous Interaction with Smart Objects 2014 6 355-356 https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-rueth-mobisys-uiso.pdf http://www.comsys.rwth-aachen.de/short/mobisys14-demo Online ACM Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14), Bretton Woods, New Hampshire, USA Bretton Woods 12th Annual International Conference on Mobile Systems, Applications, and Services 16-19 June 2014 en 978-1-4503-2793-0 10.1145/2594368.2601477 1 JanRüth HannoWirtz KlausWehrle inproceedings 2014-mmsys-wirtz-ubifi A Wireless Application Overlay for Ubiquitous Mobile Multimedia Sensing and Interaction 2014 3 https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-wirtz-mmsys-ubifi.pdf Online ACM Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore Singapore 5th ACM Multimedia Systems Conference 19-21 March 2014 en 978-1-4503-2705-3 10.1145/2557642.2578224 1 HannoWirtz JanRüth TorstenZimmermann MatteoCeriotti KlausWehrle article 2013-raza-lithe Lithe: Lightweight Secure CoAP for the Internet of Things IEEE Sensors Journal 2013 10 13 10 3711-3720 Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security iotsec en 1530-437X 10.1109/JSEN.2013.2277656 1 ShahidRaza HosseinShafagh KasunHewage RenéHummen ThiemoVoigt inproceedings 2013-chants-wirtz-heaven Interest-based Cloud-facilitated Opportunistic Networking 2013 9 30 1--8 https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf Online ACM Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA Miami, USA Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013) 30 September 2013 en 978-1-4503-2363-5 10.1145/2505494.2505504 1 HannoWirtz JanRüth TorstenZimmermann KlausWehrle inproceedings 2013-hummen-towards Towards Viable Certificate-based Authentication for the Web of Things 2013 4 19 iotsec fileadmin/papers/2013/2013-hummen-towards.pdf ACM Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13) Budapest, Hungary 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy en 978-1-4503-2003-0 10.1145/2463183.2463193 1 RenéHummen Jan HenrikZiegeldorf HosseinShafagh ShahidRaza KlausWehrle inproceedings 2012-IPIN-Viol-HMM Hidden Markov Model-based 3D Path-matching using Raytracing-generated Wi-Fi Models 2012 11 13 1--10 fileadmin/papers/2012/2012-11-viol-ipin.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6418873&tag=1 Online Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia Sydney, Australia 2012 International Conference on Indoor Positioning and Indoor Navigation November 13--15, 2012 en 978-1-4673-1955-3 10.1109/IPIN.2012.6418873 1 NicolaiViol Jó AgilaBitsch Link HannoWirtz DirkRothe KlausWehrle inproceedings 2012-stoffers-mascots-ns3-propagation-models Comparing the ns–3 Propagation Models 2012 8 61--67 nonRWTH https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-ns3-propagation-models.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6298165 Print IEEE Proceedings of the 20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'12), Washington D.C., USA Washington D.C., USA 20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10) en 978-1-4673-2453-3 10.1109/MASCOTS.2012.17 1 MirkoStoffers GeorgeRiley inproceedings 2012-stoffers-pads-hybrid-simulation Hybrid Simulation of Packet-Level Networks and Functional-Level Routers 2012 7 111--119 nonRWTH https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-hybrid-simulation.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6305897 Print IEEE Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China Zhangjiajie, China en 978-0-7695-4714-5 1087-4097 10.1109/PADS.2012.22 1 MirkoStoffers GeorgeRiley inproceedings 2012-wons-bosling-redmann-weingaertner Can P2P swarm loading improve the robustness of 6LoWPAN data transfer? 2012 1 9 131-134 https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-students-6lowpan-wons2012.pdf http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6138950# Online IEEE
Piscataway, NJ, USA
Proceedings of the 9th International Conference on Wireless On-demand Network Systems and Services (WONS '12), Courmayeur, Italy Courmayeur, Italy en 978-1-4577-1722-2 10.1109/WONS.2012.6152218 1 MarcelBosling TorstenRedmann JeanTekam EliasWeingaertner KlausWehrle
inproceedings Varj1112:Secure Secure Resolution of <prt>End-Host</prt> Identifiers for Mobile Clients 2011 12 5 Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution fileadmin/papers/2011/2011-varjonen-secure.pdf Online IEEE
Piscataway, NJ, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award accepted en 978-1-4244-9268-8 1930-529X 1 SamuVarjonen TobiasHeer KennethRimey AndreiGurtov
article 2011-kai-JITSR Project Report: Standardising the Internet of Things – What the Experts Think Int. J. on IT Standards & Standardisation Research 2011 1 9 1 fileadmin/papers/2011/2011-kai-JITSR.pdf print IGI Global
Hershey, PA, US
1539-3062 1 KaiJakobs ThomasWagner KaiReimers
techreport rfc5201-bis-03 <prt>Host Identity Protocol Version 2</prt> 2010 10 1 draft-ietf-hip-rfc5201-bis-03.txt <prt>expires: April 26, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer inproceedings 2010softcomweingaertnerprotocolanalysis Flexible Analysis of Distributed Protocol Implementations using Virtual Time 2010 9 23 225 - 229 available in IEEE Xplore https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-weingaertner-softcom-analysis.pdf Online FESB
Split, Croatia
Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010) Hvar, Croatia en 978-1-4244-8663-2 1 EliasWeingaertner MarkoRitter RaimondasSasnauskas KlausWehrle
techreport rfc5201-bis-01 <prt>Host Identity Protocol Version 2</prt> 2010 9 1 draft-ietf-hip-rfc5201-bis-01.txt <prt>expires: March 7, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer techreport moskowitz-rfc5201-bis-02 <prt>Host Identity Protocol Version 2</prt> 2010 7 1 draft-moskowitz-hip-rfc5201-bis-02.txt <prt>expires: January 2, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer techreport rfc5201-bis-02 <prt>Host Identity Protocol Version 2</prt> 2010 7 1 draft-ietf-hip-rfc5201-bis-02.txt <prt>expires: March 7, 2011 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz PetriJokela ThomasR. Henderson TobiasHeer techreport moskowitz-rfc5201-bis-01 <prt>Host Identity Protocol Version 2</prt> 2010 3 1 draft-moskowitz-hip-rfc5201-bis-01.txt <prt>expires: September 10, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 RobertMoskowitz Pekka Nikander PetriJokela ThomasR. Henderson TobiasHeer inproceedings 2010-kai-mccsis.pdf Standardising the IoT – Collaboration or Competition? 2010 62-66 https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F# CD Sandeep Krishnamurthy, Gurmit Singh, Maggie McPherson IADIS, International Association for Development of the Information Society Proc. e-Democracy, Equity and Social Justice - EDEM2010, Freiburg, Germany en 978-972-8939-24-3 1 KaiJakobs ThomasWagner KaiReimers inproceedings 2010-kai-erima Developing Standards for the IoT - A Collaborative Exercise!? 2010 3 108-116 https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F# Online, CD L. Legardeur; K. North ERIMA
Bidart, FR
Towards new challenges for innovative management practices en 2100-0778 1 KaiJakobs ThomasWagner KaiReimers
conference 200810riechelcncerco Range Queries and Load Balancing in a Hierarchically Structured P2P System 2008 10 14 28-35 Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, are used more and more for file-sharing and content distribution applications. However, a major weakness of traditional DHTs is the search for stored content, as data is assigned to nodes based on hash functions, and the very nature of hash tables allows only exact pattern matches. We present Cerco, a solution for the problem of range queries by using the principles of order-preserving DHTs and a hierarchically structured P2P approach. To guarantee an efficient routing and load balancing, Cerco uses a dynamic hierarchy of DHTs by creating subrings on demand and two explicit load balancing strategies. Our evaluation shows that Cerco is able to achieve the goals of supporting range queries, logarithmic-hop routing, and efficient load balancing. RWTH Aachen University - Distributed Systems Group http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4664131&arnumber=4664148&count=180&index=16 http://web.informatik.uni-bonn.de/IV/Mitarbeiter/matthew/Mirror_LCN2008_Website/www.ieeelcn.org/ Print IEEE Press Proceedings of 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008) IEEE Montreal, Canada 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008) 14-17 Oct. 2008 en 978-1-4244-2412-2 10.1109/LCN.2008.4664148 1 SimonRieche Bui TheVinh KlausWehrle conference 200803riechemmvecluster Clustering Players for Load Balancing in Virtual Worlds 2008 3 18 9-13 Massively Multiplayer Online Games (MMOGs) have become increasingly popular in the last years. So far the distribution of load, caused by the players in these games, is not distributed dynamically. After the launch of a new game, the introduction of new content, during special ingame events, or also during normal operations, players tend to concentrate in certain regions of the game worlds and cause overload conditions. Therefore we propose the use of structured P2P technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas; however this approach often split a group of players to different servers, causing additional overhead. This work presents a cluster-based Peer-to-Peer approach, which can be used for load balancing in MMOGs or in other virtual worlds. The system is able to dynamically adapt to the current state of the game and handle uneven distributions of the players in the game world. We show through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based systems, which split the world in rectangular areas. RWTH Aachen University - Distributed Systems Group http://www.pap.vs.uni-due.de/MMVE08/papers/proceedings.pdf http://www.pap.vs.uni-due.de/MMVE08/ Online Gregor Schiele, Daniel Weiskopf, Ben Leong, Shun-Yun Hu Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008) Reno, Nevada, USA 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008) March 8th, 2008 en 1 SimonRieche KlausWehrle MarcFouquet HeikoNiedermayer TimoTeifel GeorgCarle article 200812riecheIJAMCcluster Clustering Players for Load Balancing in Virtual Worlds International Journal of Advanced Media and Communication (IJAMC) 2008 2 4 351-363 In current Massively Multiplayer Online Games (MMOGs) the distribution of load is not distributed dynamically. But players tend to concentrate in certain regions of the game world and cause overload conditions. Therefore we propose the use of structured Peer-to-Peer technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas but often split a group of players to different servers. This work presents a cluster-based P2P approach, which is able to dynamically adapt to the current state of the game and handle uneven distributions of players.Weshow through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based system. RWTH Aachen University - Distributed Systems Group http://www.inderscience.com/browse/index.php?journalID=67 print en 1462-4613 1 SimonRieche KlausWehrle MarcFouquet HeikoNiedermayer TimoTeifel GeorgCarle conference 200701riecheccncmmog Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games 2007 1 11 763-767 Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive betatesting suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world. RWTH Aachen University - Distributed Systems Group http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4199088&arnumber=4199243&count=254&index=154 http://www.ieee-ccnc.org/2007/ Print IEEE Press Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007) IEEE Las Vegas, Nevada, USA 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007) 11-13 January 2007 en 1-4244-0667-6 10.1109/CCNC.2007.155 1 SimonRieche KlausWehrle MarcFouquet HeikoNiedermayer LeoPetrak GeorgCarle conference rieche2006cerco Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System 2006 11 14 509-510 Structured Peer-to-Peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called Distributed Hash Tables (DHTs) is partitioned and each partition with its keys and values is assigned to a node in the DHT. For data retrieval however, the very nature of hash tables allows only exact pattern matches. We propose Cerco, a simple solution for the problem of range queries by employing a hierarchically structured P2P approach based on the principles of Distributed Hash Tables. We show that a dynamic hierarchy of DHTs with on-demand classification of items can positively influence the response time of queries while maintaining lookup correctness. RWTH Aachen University - Distributed Systems Group http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4116490&arnumber=4116594&count=192&index=90 http://web.archive.org/web/20061008091738/http://www.ieeelcn.org/ Print IEEE Press Proceedings of 31st IEEE Conference on Local Computer Networks (LCN 2006) IEEE Tampa, Florida, USA 31st IEEE Conference on Local Computer Networks (LCN 2006) 14-16 November 2006 en 1-4244-0418-5 10.1109/LCN.2006.322147 1 SimonRieche KlausWehrle LeoPetrak ClemensWrzodek techreport 200608riechetrmmog Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games 2006 8 WSI-2006-04 Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive beta-testing suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world. RWTH Aachen University - Distributed Systems Group http://www.rieche.net/pdf/wsi-2006-04.pdf Online
Tübingen, Germany
Wilhelm-Schickard-Institute for Computer Science, University of Tübingen Technical Report en SimonRieche MarcFouquet HeikoNiedermayer LeoPetrak KlausWehrle GeorgCarle
inproceedings 2006-heer-percomws-adapt-dht Adapting Distributed Hash Tables for Mobile Ad Hoc Networks 2006 3 16 1 1-6 http://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2006-heer-percomws-dht-adhoc.pdf Print IEEE
Washington, DC, USA
In Proceedings of 3. IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P'06), Pisa, Italy. Pisa, Italy IEEE International Workshop on Mobile Peer-to-Peer Computing March 2006 en 0-7695-2520-2 10.1109/PERCOMW.2006.16 1 TobiasHeer StefanGötz SimonRieche KlausWehrle
poster rieche2006poster Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games 2006 3 Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive beta-testing suffer from downtimes because of hard- and software problems and lags on overloaded servers. Our approach is to use structured P2P technology for the server infrastructure of massively multiplayer online games to improve reliability and scalability of these applications. Structured P2P networks are able to adapt to the current state of the game world and handle uneven distributions of the players. For load balancing, we propose algorithms based on the virtual server concept. RWTH Aachen University - Distributed Systems Group http://www.dagstuhl.de/de/programm/kalender/semhp/?semnr=06131 Print Dagstuhl Seminar 06131 "Peer-to-Peer Systems and Applications" Dagstuhl Dagstuhl Seminar 06131 en SimonRieche KlausWehrle inproceedings landsiedel2005anonymous Anonymous IP-Services via Overlay Routing 2005 3 Although research provides anonymous Internet communication schemes, anonymous IP-services received only limited attention. In this paper we present SARA (Anonymous Overlay Routing Providing Sender And Receiver Anonymity), which enables sender, receiver and relationship anonymity using layered encryption and distributed traffic mixes, similar to a Chaumian Mix. Via IP-datagram service and address virtualization it is fully transparent to applications. Organized as structured Peer-To-Peer system, SARA is highly scalable and fault tolerant. In SARA each communication partner randomly selects a number of nodes from the overlay and concatenates them to an anonymous communication path. The sender selects the head of the path, the receiver builds the tail and publishes this information in the overlay network using an anonymous ID. Via this ID the sender retrieves the tail nodes of the path and concatenates both path section. Layered encryption hides the identities of the sender, receiver and the intermediate nodes. 5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung" Würzburg, Germany 5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung" March 2005 OlafLandsiedel SimonRieche HeikoNiedermayer KlausWehrle GeorgCarle inproceedings petrak2005dienstguete Dienstgüte in strukturierten hierarchischen Overlay Netzwerken 2005 3 Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005 Kaiserslautern, Germany Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005 March 2005 LeoPetrak SimonRieche KlausWehrle inproceedings niedermayer2005distribution On the Distribution of Nodes in Distributed Hash Tables 2005 3 Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005 Kaiserslautern, Germany Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005 March 2005 HeikoNiedermayer SimonRieche KlausWehrle GeorgCarle inproceedings 200507riecheipgames On the Use of Structured Peer-to-Peer Systems for Online Gaming 2005 3 Massively multiplayer games are becoming increasingly popular today. However, even high-budget titles suffer from downtimes because of hard- and software problems. Our approach is to use structured Peer-to-Peer technology for the server infrastructure of massively multiplayer online games, which improves reliability and scalability of these applications. 5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung" Würzburg, Germany 5. Würzburger "Workshop IP Netzmanagement, IP Netzplanung und Optimierung" March 2005 SimonRieche MarcFouquet HeikoNiedermayer KlausWehrle GeorgCarle inbook 200509riechep2pbookreliability Reliability and Load Balancing in Distributed Hash Tables 2005 119-135 Ralf Steinmetz, Klaus Wehrle Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS 9 Peer-to-Peer Systems and Applications SimonRieche HeikoNiedermayer StefanGötz KlausWehrle
inbook 200509goetzp2pbookdhtalgorithms Selected Distributed Hash Table Algorithms 2005 95-117 Ralf Steinmetz, Klaus Wehrle Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS 8 Peer-to-Peer Systems and Applications StefanGötz SimonRieche KlausWehrle
inbook 200509wehrlep2pbookdhts Distributed Hash Tables 2005 79-93 Ralf Steinmetz, Klaus Wehrle Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS 7 Peer-to-Peer Systems and Applications KlausWehrle StefanGötz SimonRieche
inproceedings 200503landsiedelfgsnaeon Project AEON 2005 481 72-76 Power consumption is a crucial characteristic of sensor networks and their applications, as sensor nodes are commonly battery driven. Although recent research focuses strongly on energy aware applications and operating systems, power consumption is still a limiting factor. Once sensor nodes are deployed, it is challenging and sometimes even impossible to change batteries. As a result, erroneous lifetime prediction causes high costs and may render a sensor network useless, before its purpose is fulfilled. In this paper we present AEON, a novel evaluation tool to quantitatively predict power consumption of sensor nodes and whole sensor networks. Our energy model, based on measurements of node current draw and the execution of real code, enables accurate prediction of the actual power consumption of sensor nodes. Consequently, preventing erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency.
Zürich, CH
Proceedings of the 4th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Techical Report No. 481 OlafLandsiedel KlausWehrle SimonRieche StefanGötz LeoPetrak
conference rieche2004thermaldissipation A Thermal-Dissipation-based Approach for Balancing Data Load in Distributed Hash Tables 2004 11 15-23 A major objective of peer-to-peer (P2P) systems is the management of large amounts of data distributed across many systems. Distributed hash tables (DHT) are designed for highly scalable, self-organizing, and efficient distribution and lookup of data, whereby data is stored globally persistent. The range of values of the corresponding hash function is partitioned and each interval is assigned to a node of the DHT. Because the assignment of data to nodes is based on hash functions, one assumes that the respective data load is distributed evenly across all participating nodes. However most DHT show difficulties with load balancing as we demonstrate in this paper. As a solution for this problem, we present a new and very simple approach for balancing stored data between peers in a fashion analogous to the dissipation of heat energy in materials. We compare this algorithm with other approaches for load balancing and present results based on simulations and a prototype implementation. This new algorithm improves the distribution of load in DHT without requiring major changes of the DHT themselves. In addition, we show that the fault tolerance of peer-to-peer systems is increased by the proposed algorithm. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=29935&arnumber=1367197&count=128&index=2 Print IEEE Press Proceedings of LCN 2004 – 29th IEEE Conference on Local Computer Networks IEEE Tampa, Florida, USA LCN 2004 – 29th IEEE Conference on Local Computer Networks November 2004 en 0-7695-2260-2 10.1109/LCN.2004.10 SimonRieche LeoPetrak KlausWehrle inproceedings 200410riechehotp2preliability Reliability of Data in Structured Peer-to-Peer Systems 2004 10 108-113 Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. For this purpose Distributed Hash Tables (DHT) offer a highly scalable and self-organizing paradigm for efficient distribution and retrieval of data. Thereby a common assumption of P2P-Systems is, that the participating nodes are unreliable and may fail at any time. Since many of research goes into the design of DHT lookup services, these systems aim to provide a stable global addressing structure. But to storage data reliable in a DHT only few techniques were already developed. However since data has to be stored persistent in the network, it should be retrieved anytime, even if nodes fail. In this work we discuss possibilities to store data fault tolerant in a structured Peer-to-Peer system. Print Proceedings of HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) Volendam, Netherlands HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer Oct. 2004 en 1 SimonRieche KlausWehrle OlafLandsiedel StefanGötz LeoPetrak inproceedings rieche2004comparison Comparison of Load Balancing Algorithms for Structured Peer-to-Peer Systems 2004 9 51 Print GI. LNI
Bonn, Germany
LNI Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), GI-Jahrestagung Informatik 2004 Ulm, Germany GI-Jahrestagung Informatik 2004 en 1 SimonRieche LeoPetrak KlausWehrle
inproceedings 2006-heer-gi2004 On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios 2004 9 51 239-244 Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics – namely scalability, flexibility, and resilience – they are quite interesting for being applied in ad-hoc networks. But, there are plenty of open questions concerning the applicability of Distributed Hash Tables in mobile ad-hoc scenarios: Do new problems arise when both technologies are used together? Are there any synergy effects when both technologies are combined? Are the results and assumptions, made for the infrastructural Internet, still true if a mobile ad-hoc network is used instead? In this paper, we discuss these and further questions and offer some solutions for using Distributed Hash Tables in ad-hoc networks. Print GI. LNI
Bonn, Germany
LNI Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), GI-Jahrestagung Informatik 2004, Bonn, Germany Ulm, Germany GI-Jahrestagung Informatik 2004 en 3-88579-380-6 1 TobiasHeer HeikoNiedermayer LeoPetrak SimonRieche KlausWehrle
inproceedings 200410wehrlefgpcintegriertekonstruktionsmethode Integrierte Konstruktionsmethoden für flexible Protokolle in ubiquitären Kommunikationssystemen 2004
Stuttgart, Germany
Proceedings of the GI/ITG KuVS Fachgespräch Systemsoftware für Pervasive Computing KlausWehrle OlafLandsiedel SimonRieche StefanGötz LeoPetrak
inproceedings 1997-thissen-kivs-trader Einbeziehung von Nutzerinteressen bei der QoS-basierten Dienstvermittlung unter CORBA 1997 236-251 Print Springer Proceedings der 10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97), Braunschweig, Germany Braunschweig 10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97) de 3-540-62565-8 1 PeterReichl ClaudiaLinnhoff-Popien DirkThißen inproceedings 1996-thissen-dccn-trader How to Enhance Service Selection in Distributed Systems 1996 114-123 Print Proceedings of the 1st International Conference on Distributed Computer Communication Networks (DCCN'96), Tel Aviv, Isreal Tel Aviv, Isreal 1st International Conference on Distributed Computer Communication Networks (DCCN'96) en PeterReichl DirkThißen ClaudiaLinnhoff-Popien