% % This file was created by the TYPO3 extension % bib % --- Timezone: CET % Creation date: 2024-03-29 % Creation time: 11-38-40 % --- Number of references % 13 % @Techreport { 2013-schmidt-rtp-extended, title = {Support for Error Tolerance in the Real-Time Transport Protocol}, year = {2013}, month = {12}, day = {20}, number = {AIB-2013-19}, number2 = {arXiv:1312.5892 [cs.NI]}, pages = {1--24}, tags = {refector}, url = {fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf}, misc2 = {Online}, publisher = {Department of Computer Science, RWTH Aachen}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {Department of Computer Science, RWTH Aachen}, type = {Technical Report}, language = {en}, ISSN = {0935-3232}, author = {Schmidt, Florian and Orlea, David and Wehrle, Klaus} } @Techreport { 2013-draft-hummen-dtls-extended-session-resumption-01, title = {Extended DTLS Session Resumption for Constrained Network Environments}, year = {2013}, month = {10}, day = {18}, number = {draft-hummen-dtls-extended-session-resumption-01}, abstract = {This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Hummen, Ren{\'e} and Gilger, Johannes and Shafagh, Hossein} } @Article { 2013-elsevir-aktas-harnessing-cross-layer-design, title = {Harnessing Cross-Layer Design}, journal = {Elsevir Ad-hoc Networks}, year = {2013}, month = {10}, day = {1}, tags = {crawler}, reviewed = {1}, author = {Aktas, Ismet and Alizai, Muhammad Hamad and Schmidt, Florian and Wirtz, Hanno and Wehrle, Klaus} } @Article { 2013-raza-lithe, title = {Lithe: Lightweight Secure CoAP for the Internet of Things}, journal = {IEEE Sensors Journal}, year = {2013}, month = {10}, volume = {13}, number = {10}, pages = {3711-3720}, keywords = {Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security}, tags = {iotsec}, language = {en}, ISSN = {1530-437X}, DOI = {10.1109/JSEN.2013.2277656}, reviewed = {1}, author = {Raza, Shahid and Shafagh, Hossein and Hewage, Kasun and Hummen, Ren{\'e} and Voigt, Thiemo} } @Inproceedings { 2013-wintech-schmidt-senserr, title = {Bit Error Distribution and Mutation Patterns of Corrupted Packets in Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {30}, pages = {49--56}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-schmidt-wintech-errors.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)}, event_date = {30 September 2013}, language = {en}, DOI = {10.1145/2505469.2505475}, reviewed = {1}, author = {Schmidt, Florian and Ceriotti, Matteo and Wehrle, Klaus} } @Techreport { 2013-draft-garcia-core-security-06, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {9}, day = {11}, number = {draft-garcia-core-security-06}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-06}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2013-smith-extremecom-demo, title = {Demo: Opportunistic Deployment Support for Wireless Sensor Networks}, year = {2013}, month = {8}, day = {24}, pages = {1--2}, note = {won ''coolest demo award''}, url = {fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf}, misc = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 5th Extreme Conference on Communication}, event_place = {Thorsmork, Iceland}, event_name = {5th Extreme Conference on Communication}, event_date = {August 24-30, 2013}, language = {en}, ISBN = {978-1-4503-2171-6}, reviewed = {1}, author = {Smith, Paul and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { Dombrowski2013WiOpt, title = {Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications}, year = {2013}, month = {5}, day = {13}, pages = {341-348}, keywords = {energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi}, booktitle = {11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013)}, event_place = {Tsukuba Science City, Japan}, language = {English}, reviewed = {1}, author = {Dombrowski, Christian and Petreska, Neda and G{\"o}rtzen, Simon and Schmeink, Anke and Gross, James} } @Inproceedings { 2013-hummen-towards, title = {Towards Viable Certificate-based Authentication for the Web of Things}, year = {2013}, month = {4}, day = {19}, tags = {iotsec}, url = {fileadmin/papers/2013/2013-hummen-towards.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)}, event_place = {Budapest, Hungary}, event_name = {2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy}, language = {en}, ISBN = {978-1-4503-2003-0}, DOI = {10.1145/2463183.2463193}, reviewed = {1}, author = {Hummen, Ren{\'e} and Ziegeldorf, Jan Henrik and Shafagh, Hossein and Raza, Shahid and Wehrle, Klaus} } @Inproceedings { 2013-hummen-6lowpan, title = {6LoWPAN Fragmentation Attacks and Mitigation Mechanisms}, year = {2013}, month = {4}, day = {17}, tags = {iotsec; sensorcloud}, url = {fileadmin/papers/2013/2013-hummen-6lowpan.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)}, event_place = {Budapest, Hungary}, event_name = {6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)}, language = {en}, ISBN = {978-1-4503-1998-0}, DOI = {10.1145/2462096.2462107}, reviewed = {1}, author = {Hummen, Ren{\'e} and Hiller, Jens and Wirtz, Hanno and Henze, Martin and Shafagh, Hossein and Wehrle, Klaus} } @Inproceedings { 2013-schmidt-wons-rtp, title = {A Heuristic Header Error Recovery Scheme for RTP}, year = {2013}, month = {3}, day = {19}, pages = {186--190}, tags = {refector}, url = {fileadmin/papers/2013/2013-schmidt-wons-rtp-refector.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13), Banff, Canada}, event_place = {Banff, Canada}, event_name = {10th International Conference on Wireless On-demand Network Systems and Services (WONS'13)}, event_date = {17-20 March 2013}, language = {en}, ISBN = {978-1-4799-0747-2}, DOI = {10.1109/WONS.2013.6578345}, reviewed = {1}, author = {Schmidt, Florian and Orlea, David and Wehrle, Klaus} } @Techreport { 2013-draft-garcia-core-security-05, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {3}, day = {11}, number = {draft-garcia-core-security-05}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-05}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Phdthesis { 2013-sasnaukas-phdthesis, title = {Symbolic Execution of Distributed Systems}, year = {2013}, school = {RWTH Aachen University}, author = {Sasnaukas, Raimondas} }