This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-20 Creation time: 07-55-17 --- Number of references 13 techreport 2013-schmidt-rtp-extended Support for Error Tolerance in the Real-Time Transport Protocol 2013 12 20 AIB-2013-19 arXiv:1312.5892 [cs.NI] 1--24 refector fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf Online Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen Technical Report en 0935-3232 FlorianSchmidt DavidOrlea KlausWehrle
techreport 2013-draft-hummen-dtls-extended-session-resumption-01 Extended DTLS Session Resumption for Constrained Network Environments 2013 10 18 draft-hummen-dtls-extended-session-resumption-01 This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246]. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01 Online Internet Engineering Task Force Internet-Draft en RenéHummen JohannesGilger HosseinShafagh article 2013-elsevir-aktas-harnessing-cross-layer-design Harnessing Cross-Layer Design Elsevir Ad-hoc Networks 2013 10 1 crawler 1 IsmetAktas Muhammad HamadAlizai FlorianSchmidt HannoWirtz KlausWehrle article 2013-raza-lithe Lithe: Lightweight Secure CoAP for the Internet of Things IEEE Sensors Journal 2013 10 13 10 3711-3720 Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security iotsec en 1530-437X 10.1109/JSEN.2013.2277656 1 ShahidRaza HosseinShafagh KasunHewage RenéHummen ThiemoVoigt inproceedings 2013-wintech-schmidt-senserr Bit Error Distribution and Mutation Patterns of Corrupted Packets in Low-Power Wireless Networks 2013 9 30 49--56 https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-schmidt-wintech-errors.pdf Online ACM Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA Miami, USA 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013) 30 September 2013 en 10.1145/2505469.2505475 1 FlorianSchmidt MatteoCeriotti KlausWehrle techreport 2013-draft-garcia-core-security-06 Security Considerations in the IP-based Internet of Things 2013 9 11 draft-garcia-core-security-06 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-06 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik inproceedings 2013-smith-extremecom-demo Demo: Opportunistic Deployment Support for Wireless Sensor Networks 2013 8 24 1--2 won "coolest demo award" fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf Online Hui, Pan and Lindgren, Anders ACM Proceedings of the 5th Extreme Conference on Communication Thorsmork, Iceland 5th Extreme Conference on Communication August 24-30, 2013 en 978-1-4503-2171-6 1 PaulSmith Jó AgilaBitsch Link KlausWehrle inproceedings Dombrowski2013WiOpt Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications 2013 5 13 341-348 energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi 11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013) Tsukuba Science City, Japan English 1 ChristianDombrowski NedaPetreska SimonGörtzen AnkeSchmeink JamesGross inproceedings 2013-hummen-towards Towards Viable Certificate-based Authentication for the Web of Things 2013 4 19 iotsec fileadmin/papers/2013/2013-hummen-towards.pdf ACM Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13) Budapest, Hungary 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy en 978-1-4503-2003-0 10.1145/2463183.2463193 1 RenéHummen Jan HenrikZiegeldorf HosseinShafagh ShahidRaza KlausWehrle inproceedings 2013-hummen-6lowpan 6LoWPAN Fragmentation Attacks and Mitigation Mechanisms 2013 4 17 iotsec; sensorcloud fileadmin/papers/2013/2013-hummen-6lowpan.pdf ACM Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) Budapest, Hungary 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) en 978-1-4503-1998-0 10.1145/2462096.2462107 1 RenéHummen JensHiller HannoWirtz MartinHenze HosseinShafagh KlausWehrle inproceedings 2013-schmidt-wons-rtp A Heuristic Header Error Recovery Scheme for RTP 2013 3 19 186--190 refector fileadmin/papers/2013/2013-schmidt-wons-rtp-refector.pdf Online IEEE Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13), Banff, Canada Banff, Canada 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13) 17-20 March 2013 en 978-1-4799-0747-2 10.1109/WONS.2013.6578345 1 FlorianSchmidt DavidOrlea KlausWehrle techreport 2013-draft-garcia-core-security-05 Security Considerations in the IP-based Internet of Things 2013 3 11 draft-garcia-core-security-05 A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things. Work in progress iotsec; ietf http://tools.ietf.org/html/draft-garcia-core-security-05 Online Internet Engineering Task Force Internet-Draft en OscarGarcia-Morchon Sye LoongKeoh Sandeep S.Kumar RenéHummen RenéStruik phdthesis 2013-sasnaukas-phdthesis Symbolic Execution of Distributed Systems 2013 RWTH Aachen University RaimondasSasnaukas