This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-09-09
Creation time: 08-07-27
--- Number of references
70
article
2024_lohmoeller_sovereignty-survey
The Unresolved Need for Dependable Guarantees on Security, Sovereignty, and Trust in Data Ecosystems
Data & Knowledge Engineering
2024
5
1
151
Data ecosystems emerged as a new paradigm to facilitate the automated and massive exchange of data from heterogeneous information sources between different stakeholders. However, the corresponding benefits come with unforeseen risks as sensitive information is potentially exposed, questioning their reliability. Consequently, data security is of utmost importance and, thus, a central requirement for successfully realizing data ecosystems. Academia has recognized this requirement, and current initiatives foster sovereign participation via a federated infrastructure where participants retain local control over what data they offer to whom. However, recent proposals place significant trust in remote infrastructure by implementing organizational security measures such as certification processes before the admission of a participant. At the same time, the data sensitivity incentivizes participants to bypass the organizational security measures to maximize their benefit. This issue significantly weakens security, sovereignty, and trust guarantees and highlights that organizational security measures are insufficient in this context. In this paper, we argue that data ecosystems must be extended with technical means to (re)establish dependable guarantees. We underpin this need with three representative use cases for data ecosystems, which cover personal, economic, and governmental data, and systematically map the lack of dependable guarantees in related work. To this end, we identify three enablers of dependable guarantees, namely trusted remote policy enforcement, verifiable data tracking, and integration of resource-constrained participants. These enablers are critical for securely implementing data ecosystems in data-sensitive contexts.
Data sharing; Confidentiality; Integrity protection; Data Markets; Distributed databases
internet-of-production; coat-ers; vesitrust
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-lohmoeller-data-sovereignty-survey.pdf
Elsevier
0169-023X
10.1016/j.datak.2024.102301
1
JohannesLohmöller
JanPennekamp
RomanMatzutt
Carolin VictoriaSchneider
EduardVlad
ChristianTrautwein
KlausWehrle
article
2024_pennekamp_supply-chain-survey
An Interdisciplinary Survey on Information Flows in Supply Chains
ACM Computing Surveys
2024
2
1
56
2
Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.
information flows; data communication; supply chain management; data security; data sharing; systematic literature review
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf
ACM
0360-0300
10.1145/3606693
1
JanPennekamp
RomanMatzutt
ChristopherKlinkmüller
LennartBader
MartinSerror
EricWagner
SidraMalik
MariaSpiß
JessicaRahn
TanGürpinar
EduardVlad
Sander J. J.Leemans
Salil S.Kanhere
VolkerStich
KlausWehrle
inproceedings
2023_sloun_accessibility
Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation
2023
11
27
3543-3545
The generation of datasets is one of the most promising approaches to collecting the necessary behavior data to train machine learning models for host-based intrusion detection. While various dataset generation methods have been proposed, they are often limited and either only generate network traffic or are restricted to a narrow subset of applications. We present Vulcan, a preliminary framework that uses accessibility features to generate datasets by simulating user interactions for an extendable set of applications. It uses behavior profiles that define realistic user behavior and facilitate dataset updates upon changes in software versions, thus reducing the effort required to keep a dataset relevant. Preliminary results show that using accessibility features presents a promising approach to improving the quality of datasets in the HIDS domain.
Intrusion Detection, Dataset Generation, Accessibility Features
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-sloun-vulcan-accessibility.pdf
ACM
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23), November 26-30, 2023, Copenhagen, Denmark
Copenhagen, Denmark
November 26-30, 2023
979-8-4007-0050-7/23/11
10.1145/3576915.3624404
1
Christianvan Sloun
KlausWehrle
inproceedings
2023_lohmoeller_transparency
Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems
2023
11
27
data usage control; data ecosystems; transparency logs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-lohmoeller-transparency.pdf
ACM
Proceedings of the 2023 ACM SIGSAC Conference on
Computer and Communications Security (CCS ’23), November 26-30, 2023, Copenhagen, Denmark
Copenhagen, Denmark
November 26-30, 2023
979-8-4007-0050-7/23/11
10.1145/3576915.3624371
1
JohannesLohmöller
EduardVlad
MarkusDahlmanns
KlausWehrle
inproceedings
2023_pennekamp_benchmarking_comparison
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking
2023
6
15
13901
489-505
Benchmarking is an essential tool for industrial organizations to identify potentials that allows them to improve their competitive position through operational and strategic means. However, the handling of sensitive information, in terms of (i) internal company data and (ii) the underlying algorithm to compute the benchmark, demands strict (technical) confidentiality guarantees—an aspect that existing approaches fail to address adequately. Still, advances in private computing provide us with building blocks to reliably secure even complex computations and their inputs, as present in industry benchmarks. In this paper, we thus compare two promising and fundamentally different concepts (hardware- and software-based) to realize privacy-preserving benchmarks. Thereby, we provide detailed insights into the concept-specific benefits. Our evaluation of two real-world use cases from different industries underlines that realizing and deploying secure information systems for industry benchmarking is possible with today's building blocks from private computing.
Lecture Notes in Computer Science (LNCS), Volume 13901
real-world computing; trusted execution environments; homomorphic encryption; key performance indicators; benchmarking
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-industry-benchmarking.pdf
Springer
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain
Zaragoza, Spain
35th International Conference on Advanced Information Systems Engineering (CAiSE '23)
June 12-16, 2023
978-3-031-34559-3
0302-9743
10.1007/978-3-031-34560-9_29
1
JanPennekamp
JohannesLohmöller
EduardVlad
JoschaLoos
NiklasRodemann
PatrickSapel
Ina BereniceFink
SethSchmitz
ChristianHopmann
MatthiasJarke
GüntherSchuh
KlausWehrle
MartinHenze
incollection
2023_pennekamp_crd-a.i
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
2023
2
8
35-60
The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf
Springer
Interdisciplinary Excellence Accelerator Series
Internet of Production: Fundamentals, Applications and Proceedings
978-3-031-44496-8
10.1007/978-3-031-44497-5_2
1
JanPennekamp
AnastasiiaBelova
ThomasBergs
MatthiasBodenbenner
AndreasBührig-Polaczek
MarkusDahlmanns
IkeKunze
MoritzKröger
SandraGeisler
MartinHenze
DanielLütticke
BenjaminMontavon
PhilippNiemietz
LuciaOrtjohann
MaximilianRudack
Robert H.Schmitt
UweVroomen
KlausWehrle
MichaelZeng
inproceedings
2022-rechenberg-cim
Guiding Ship Navigators through the Heavy Seas of Cyberattacks
2022
10
Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf
https://zenodo.org/record/7148794
Zenodo
European Workshop on Maritime Systems Resilience and Security (MARESEC 2022)
Bremerhaven, Germany
10.5281/zenodo.7148794
1
Merlinvon Rechenberg
NinaRößler
MariSchmidt
KonradWolsing
FlorianMotz
MichaelBergmann
ElmarPadilla
JanBauer
article
2022-henze-tii-prada
Complying with Data Handling Requirements in Cloud Storage Systems
IEEE Transactions on Cloud Computing
2022
9
10
3
1661-1674
In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and privacy concerns, complying with data handling requirements becomes a crucial property for cloud storage systems. We present Prada , a practical approach to account for compliance with data handling requirements in key-value based cloud storage systems. To achieve this goal, Prada introduces a transparent data handling layer, which empowers clients to request specific data handling requirements and enables operators of cloud storage systems to comply with them. We implement Prada on top of the distributed database Cassandra and show in our evaluation that complying with data handling requirements in cloud storage systems is practical in real-world cloud deployments as used for microblogging, data sharing in the Internet of Things, and distributed email storage.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-henze-tii-prada.pdf
Online
en
2168-7161
10.1109/TCC.2020.3000336
1
MartinHenze
RomanMatzutt
JensHiller
ErikMühmer
Jan HenrikZiegeldorf
Johannesvan der Giet
KlausWehrle
proceedings
2022-wolsing-radarsec
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
2022
9
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-radar.pdf
IEEE
Edmonton, Canada
47th IEEE Conference on Local Computer Networks (LCN)
September 26-29, 2022
10.1109/LCN53696.2022.9843801
1
KonradWolsing
AntoineSaillard
JanBauer
EricWagner
Christianvan Sloun
Ina BereniceFink
MariSchmidt
KlausWehrle
MartinHenze
inproceedings
2022-wolsing-simple
Can Industrial Intrusion Detection Be SIMPLE?
2022
9
978-3-031-17143-7
574--594
Cyberattacks against industrial control systems pose a serious risk to the safety of humans and the environment. Industrial intrusion detection systems oppose this threat by continuously monitoring industrial processes and alerting any deviations from learned normal behavior. To this end, various streams of research rely on advanced and complex approaches, i.e., artificial neural networks, thus achieving allegedly high detection rates. However, as we show in an analysis of 70 approaches from related work, their inherent complexity comes with undesired properties. For example, they exhibit incomprehensible alarms and models only specialized personnel can understand, thus limiting their broad applicability in a heterogeneous industrial domain. Consequentially, we ask whether industrial intrusion detection indeed has to be complex or can be SIMPLE instead, i.e., Sufficient to detect most attacks, Independent of hyperparameters to dial-in, Meaningful in model and alerts, Portable to other industrial domains, Local to a part of the physical process, and computationally Efficient. To answer this question, we propose our design of four SIMPLE industrial intrusion detection systems, such as simple tests for the minima and maxima of process values or the rate at which process values change. Our evaluation of these SIMPLE approaches on four state-of-the-art industrial security datasets reveals that SIMPLE approaches can perform on par with existing complex approaches from related work while simultaneously being comprehensible and easily portable to other scenarios. Thus, it is indeed justified to raise the question of whether industrial intrusion detection needs to be inherently complex.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-simple.pdf
Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi
Springer Nature Switzerland
Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS '22), September 26-30, 2022, Copenhagen, Denmark
Copenhagen, Denmark
27th European Symposium on Research in Computer Security (ESORICS)
September 26-30, 2022
10.1007/978-3-031-17143-7_28
1
KonradWolsing
LeaThiemt
Christianvan Sloun
EricWagner
KlausWehrle
MartinHenze
article
2022_brauner_iop
A Computer Science Perspective on Digital Transformation in Production
ACM Transactions on Internet of Things
2022
5
1
3
2
The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.
Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf
ACM
2691-1914
10.1145/3502265
1
PhilippBrauner
ManuelaDalibor
MatthiasJarke
IkeKunze
IstvánKoren
GerhardLakemeyer
MartinLiebenberg
JudithMichael
JanPennekamp
ChristophQuix
BernhardRumpe
Wilvan der Aalst
KlausWehrle
AndreasWortmann
MartinaZiefle
inproceedings
2020-henze-ccs-cybersecurity
Poster: Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
2020
11
9
Mitigating cybersecurity threats in power distribution grids requires a testbed for cybersecurity, e.g., to evaluate the (physical) impact of cyberattacks, generate datasets, test and validate security approaches, as well as train technical personnel. In this paper, we present a blueprint for such a testbed that relies on network emulation and power flow computation to couple real network applications with a simulated power grid. We discuss the benefits of our approach alongside preliminary results and various use cases for cybersecurity research and training for power distribution grids.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-henze-ccs-cybersecurity.pdf
ACM
New York, NY, USA
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, Virtual Event, USA.
Virtual Event, USA
November 9-13, 2020
10.1145/3372297.3420016
1
MartinHenze
LennartBader
JulianFilter
OlavLamberts
SimonOfner
Dennisvan der Velde
article
2020-holz-ccr-tls13
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
ACM SIGCOMM Computer Communications Review (CCR)
2020
7
50
3
3-15
Selected for the 'Best of CCR' session at SIGCOMM 2021.
https://ccronline.sigcomm.org/wp-content/uploads/2020/08/sigcomm-ccr-paper430-with-open-review.pdf
Association for Computing Machinery
New York, NY, USA
10.1145/3411740.3411742
1
RalphHolz
JensHiller
JohannaAmann
AbbasRazaghpanah
ThomasJost
NarseoVallina-Rodriguez
OliverHohlfeld
article
2020_mann_welding_layers
Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers
Advanced Structured Materials
2020
4
1
125
101-118
A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production.
Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19)
Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy
Internet-of-Production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf
Springer
Ponta Delgada, Azores, Portugal
October 24-25, 2019
978-981-15-2956-6
1869-8433
10.1007/978-981-15-2957-3_8
1
SamuelMann
JanPennekamp
TobiasBrockhoff
AnahitaFarhang
MahsaPourbafrani
LukasOster
Merih SeranUysal
RahulSharma
UweReisgen
KlausWehrle
Wilvan der Aalst
article
2020-wehrle-digitalshadows
Mit "Digitalen Schatten" Daten verdichten und darstellen : Der Exzellenzcluster "Internet der Produktion" forscht über die Produktionstechnik hinaus
Der Profilbereich "Information & Communication Technology"
2020
0179-079X
10.18154/RWTH-2021-02496
MatthiasJarke
Wilvan der Aalst
ChristianBrecher
MatthiasBrockmann
IstvánKoren
GerhardLakemeyer
BernhardRumpe
GüntherSchuh
KlausWehrle
MartinaZiefle
inproceedings
2019_pennekamp_infrastructure
Towards an Infrastructure Enabling the Internet of Production
2019
5
8
31-37
New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.
Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf
IEEE
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW
Taipei, TW
May 6-9, 2019
978-1-5386-8500-6/19
10.1109/ICPHYS.2019.8780276
1
JanPennekamp
RenéGlebke
MartinHenze
TobiasMeisen
ChristophQuix
RihanHai
LarsGleim
PhilippNiemietz
MaximilianRudack
SimonKnape
AlexanderEpple
DanielTrauth
UweVroomen
ThomasBergs
ChristianBrecher
AndreasBührig-Polaczek
MatthiasJarke
KlausWehrle
inproceedings
2019_wagner_dispute_resolution
Dispute Resolution for Smart Contract-based Two Party Protocols
2019
5
Blockchain systems promise to mediate interactions of mutually distrusting parties without a trusted third party. However, protocols with full smart contract-based security are either limited in functionality or complex, with high costs for secured interactions. This observation leads to the development of protocol-specific schemes to avoid costly dispute resolution in case all participants remain honest. In this paper, we introduce SmartJudge, an extensible generalization of this trend for smart contract-based two-party protocols. SmartJudge relies on a protocol-independent mediator smart contract that moderates two-party interactions and only consults protocol-specific verifier smart contracts in case of a dispute. This way, SmartJudge avoids verification costs in absence of disputes and sustains interaction confidentiality among honest parties. We implement verifier smart contracts for cross-blockchain trades and exchanging digital goods and show that SmartJudge can reduce costs by 46-50% and 22% over current state of the art, respectively.
Ethereum,Bitcoin,smart contracts,two-party protocols,dispute resolution,cross-blockchain trades
mynedata, impact-digital, rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wagner-dispute.pdf
IEEE
IEEE International Conference on Blockchain and Cryptocurrency 2019 (ICBC 2019)
Seoul, South Korea
IEEE International Conference on Blockchain and Cryptocurrency 2019
English
10.1109/BLOC.2019.8751312
1
EricWagner
AchimVölker
FrederikFuhrmann
RomanMatzutt
KlausWehrle
inproceedings
2018-tzimmermann-toplists
A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists
2018
10
31
maki
https://dl.acm.org/citation.cfm?id=3278574
https://arxiv.org/abs/1805.11506
ACM
Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278574
1
QuirinScheitle
OliverHohlfeld
JulienGamba
JonasJelten
TorstenZimmermann
Stephen D.Strowes
NarseoVallina-Rodriguez
inproceedings
2018-serror-wowmom-relaying
Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency
2018
6
11
iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-wowmom-relaying.pdf
IEEE
online
19th IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (IEEE WoWMoM 2018), Chania, Greece
Chania, Crete, Greece
WoWMoM
June 12-15, 2018
978-1-5386-4725-7
10.1109/WoWMoM.2018.8449807
1
MartinSerror
SebastianVaaßen
KlausWehrle
JamesGross
article
2018-scheitle-ccr-caa
A First Look at Certification Authority Authorization (CAA)
ACM SIGCOMM Computer Communications Review (CCR)
2018
4
48
10-23
https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf
internet-measurements
https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf
https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/
2018-06-05
10.1145/3213232.3213235
1
QuirinScheitle
TaejoongChung
JensHiller
OliverGasser
JohannesNaab
Rolandvan Rijswijk-Deij
OliverHohlfeld
RalphHolz
DaveChoffnes
AlanMislove
GeorgCarle
inproceedings
2017-henze-ic2e-prada
Practical Data Compliance for Cloud Storage
2017
4
4
252-258
ssiclops, ipacs
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-ic2e-prada.pdf
Online
IEEE
Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Vancouver, BC, Canada
en
978-1-5090-5817-4
10.1109/IC2E.2017.32
1
MartinHenze
RomanMatzutt
JensHiller
ErikMühmer
Jan HenrikZiegeldorf
Johannesvan der Giet
KlausWehrle
poster
2014-wisec-ziegeldorf-ipin
POSTER: Privacy-preserving Indoor Localization
2014
7
23
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-ziegeldorf-poster-wisec.pdf
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
en
10.13140/2.1.2847.4886
1
Jan HenrikZiegeldorf
NicolaiViol
MartinHenze
KlausWehrle
inproceedings
2014-hummen-delegation
Delegation-based Authentication and Authorization for the IP-based Internet of Things
2014
6
30
284-292
iotsec; sensorcloud
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf
Online
IEEE
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014)
Singapore
11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014)
30.06. - 03.07.2014
en
10.1109/SAHCN.2014.6990364
1
RenéHummen
HosseinShafagh
ShahidRaza
ThiemoVoigt
KlausWehrle
conference
2014-hohlfeld-harvester
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape
2014
6
http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf
http://asiaccs2014.nict.go.jp/
ACM
9th ACM Symposium on Information, Computer and Communications Security
10.1145/2590296.2590302
1
GianlucaStringhini
OliverHohlfeld
ChristopherKruegel
GiovanniVigna
article
2013-raza-lithe
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal
2013
10
13
10
3711-3720
Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security
iotsec
en
1530-437X
10.1109/JSEN.2013.2277656
1
ShahidRaza
HosseinShafagh
KasunHewage
RenéHummen
ThiemoVoigt
inproceedings
2013-wisec-garcia-securing
Securing the IP-based Internet of Things with HIP and DTLS
2013
4
119--124
ACM
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)
978-1-4503-1998-0
10.1145/2462096.2462117
1
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
PedroMoreno-Sanchez
FranciscoVidal-Meca
Jan HenrikZiegeldorf
inproceedings
2013-pitsac-vidalmeca-hip
HIP security architecture for the IP-based Internet of Things
2013
3
25
1331 - 1336
The IP-based Internet of Things refers to the
pervasive interactions of smart objects and people enabling
new applications by means of IP protocols. An application
scenario is a Smart City in which the city infrastructure,
cars, and people exchange information to enable new services.
IP protocols, such as IPv6, TCP and HTTP will be further
complemented by IPv6 over Low powerWireless Personal Area
Networks and Constrained Application Protocol currently in
development in IETF. Security and privacy are a must for
the IP-based IoTs in order to ensure its acceptance. However,
mobility, limited bandwidth, and resource-constrained devices
pose new challenges and require for a sound and efficient
security architecture. In particular, dynamic association of
mobile smart objects and the management of keys in large-scale
networks remain an open challenge. In this context, we propose
a flexible security architecture based on the Host Identity
Protocol and Multimedia Internet KEYing protocols allowing
for secure network association and key management. HIP -
based on asymmetric-key cryptography - ensures unambiguous
thing identification, mobility support, as well as a lightweight
and secure method for network association. In our solution,
HIP is extended with MIKEY capabilities to provide enhanced
key management using polynomials, which allow to generate
pairwise keys with any node based on its identity. This
combination of protocols and crypto-algorithms ensures both
strong security and very good performance as shown by our
implementation and presents clear advantages compared with
other alternatives.
Internet of Things; Security; Network Access; Key Management
Online
IEEE
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013
Barcelona, Spain
25.-28.03.2013
en
10.1109/WAINA.2013.158
1
FranciscoVidal Meca
Jan HenrikZiegeldorf
OscarGarcia-Morchon
Sandeep S.Kumar
Sye LoongKeoh
PedroMoreno-Sanchez
inproceedings
2012-IPIN-Viol-HMM
Hidden Markov Model-based 3D Path-matching using Raytracing-generated Wi-Fi Models
2012
11
13
1--10
fileadmin/papers/2012/2012-11-viol-ipin.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6418873&tag=1
Online
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia
Sydney, Australia
2012 International Conference on Indoor Positioning and Indoor Navigation
November 13--15, 2012
en
978-1-4673-1955-3
10.1109/IPIN.2012.6418873
1
NicolaiViol
Jó AgilaBitsch Link
HannoWirtz
DirkRothe
KlausWehrle
article
2012-JLBS-Bitsch-FootPath
Accurate Map-based Indoor Navigation on the Mobile
Journal of Location Based Services
2012
7
11
7
1
23-43
We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones, we accurately localise a user on her route and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.
http://www.tandfonline.com/doi/abs/10.1080/17489725.2012.692620
Online
Taylor & Francis
Bristol, PA, USA
en
1748-9733
10.1080/17489725.2012.692620
1
Jó AgilaBitsch Link
PaulSmith
NicolaiViol
KlausWehrle
inproceedings
2012-aktas-simutools-FANTASY:FullyAutomaticNetworkEmulationArchitecturewithCross-LayerSupport-conference
FANTASY: Fully Automatic Network Emulation Architecture with Cross-Layer Support
2012
3
19
57-64
crawler, fantasy
fileadmin/papers/2012/2012-aktas-simutools-fantasy.pdf
http://dl.acm.org/citation.cfm?id=2263019&CFID=88550183&CFTOKEN=31687193
Online
ICST
Brussels, Belgium
Proceedings of the 5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools '12), Desenzano del Garda, Italy
Desenzano, Italy
5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools '12)
19-23 March, 2012
en
978-1-4503-1510-4
10.4108/icst.simutools.2012.247759
1
IsmetAktas
Hendrikvom Lehn
ChristophHabets
FlorianSchmidt
KlausWehrle
inproceedings
2011-wirtz-kaleidoscope
Cooperative Wi-Fi-Sharing: Encouraging Fair Play
2011
12
14
mobile_access
fileadmin/papers/2011/2011-wirtz-kaleidoscope.pdf
Online
ITU
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
Cape Town, South Africa
ITU-T Kaleidoscope: The fully networked human?
2011-12-12
en
978-92-61-13651-2
1
HannoWirtz
RenéHummen
NicolaiViol
TobiasHeer
Mónica AlejandraLora Girón
KlausWehrle
inproceedings
Varj1112:Secure
Secure Resolution of <prt>End-Host</prt> Identifiers for Mobile Clients
2011
12
5
Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT
DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution
fileadmin/papers/2011/2011-varjonen-secure.pdf
Online
IEEE
Piscataway, NJ, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award
accepted
en
978-1-4244-9268-8
1930-529X
1
SamuVarjonen
TobiasHeer
KennethRimey
AndreiGurtov
inproceedings
2011-ipin-bitsch-footpath-long
FootPath: Accurate Map-based Indoor Navigation Using Smartphones
2011
9
21
1--8
We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.
footpath
fileadmin/papers/2011/2011-IPIN-bitsch-footpath-long.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6071934&tag=1
Online
IEEE
Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal
Guimarães, Portugal
2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)
21-23 September 2011
en
978-1-4577-1803-8
http://dx.doi.org/10.1109/IPIN.2011.6071934
1
Jó AgilaBitsch Link
PaulSmith
NicolaiViol
KlausWehrle
inproceedings
VaegsABW2011
Efficient Power Management Using Out-of-Band Signaling
2011
9
16
77-80
A tremendous amount of energy is wasted today, because computing devices are left running all the time even though they are needed only sporadically. Especially in office environments many devices (e.g., printers) are very rarely turned off, because they need to be available from time to time and because it is inconvenient having to switch them on and off manually. Existing solutions, such as Wake-on-LAN (WoL), provide support for managing the power consumption of the network devices remotely using an always-on data channel. However, these solutions are inefficient, because power to the network interface has to be maintained even when the host system is asleep just to ensure remote accessibility.
We propose a Wireless Sensor Network (WSN) based out-of-band signaling architecture for network interfaces which minimizes the systems’ power consumption during the large idle periods when nobody is using them. This is done by separating the data and control channels on the Internet-enabled devices using a low-power out-of-band signaling channel based on battery driven, energy scavenging devices. Unlike existing solutions, which only allow parts of the system to go in sleep modes, our architecture allows the whole system, including the main power supply, to be shut down.
Our initial investigation indicates a significant reduction in energy consumption of devices during idle times compared to the existing in-band signaling mechanisms such as WoL.
Energy Saving, Wireless Sensor Network, Out-of-Band Signalling
https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-vaegs-fgsn-ecocom.pdf
Online
Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN), Paderborn, Germany
RWTH Aachen University
Paderborn, Germany
10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN11)
September 15-16, 2011
en
1
TobiasVaegs
Muhammad HamadAlizai
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2011-wintech-alizai-tinywifi
TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers
2011
9
19-27
tinywifi
fileadmin/papers/2011/2010-09-tinywifi-alizai-wintech.pdf
Online
ACM
New York, NY, USA
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH ), Las Vegas, NV, USA
Las Vegas, NV, USA
The 17th Annual International Conference on Mobile Computing and Networking
September 2011
en
978-1-4503-0867-0
10.1145/2030718.2030725
1
Muhammad HamadAlizai
HannoWirtz
BernhardKirchen
TobiasVaegs
OmprakashGnawali
KlausWehrle
inproceedings
2011-hummen-pisa-demo
PISA-SA - Security and Mobility in a Collaborative Muni-Fi (Demo Abstract)
2011
6
15
15
35--36
mobile_access
fileadmin/papers/2011/2011-hummen-wisec-pisa-sa-demo.pdf
Online
ACM
New York, NY, USA
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany
Hamburg, Germany
Wireless Network Security 2011 (WiSec 2011)
en
1559-1662
10.1145/2073290.2073297
1
RenéHummen
HannoWirtz
NicolaiViol
TobiasHeer
KlausWehrle
techreport
rfc6253
<prt>Host Identity Protocol Certificates</prt>
2011
5
rfc6253
The Certificate (CERT) parameter is a container for digital
certificates. It is used for carrying these certificates in Host Identity Protocol (HIP) control packets.
This document specifies the CERT parameter and the error signaling in case of a failed verification.
Additionally, this document specifies the representations of Host Identity Tags in X.509 version 3 (v3) and Simple Public Key Infrastructure (SPKI) certificates.
The concrete use of certificates, including how certificates are obtained, requested, and which actions are taken upon successful or failed verification, is specific to the scenario in which the certificates are used.
Hence, the definition of these scenario- specific aspects is left to the documents that use the CERT parameter.
mobile_access
http://www.ietf.org/rfc/rfc6253.txt
IETF
RFC 6253 (Experimental)
Request for Comments
Internet Engineering Task Force
Internet Engineering Task Force
Request For Commments (Experimental Standard)
1
TobiasHeer
SamuVarjonen
inproceedings
2011-ipsn-alizai-pad
Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks
2011
4
fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf
Online
ACM
New York, NY, USA
Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA
Chicago, IL, USA
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
StefanGötz
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2011-nsdi-slicetime-weingaertner
SliceTime: A platform for scalable and accurate network emulation
2011
3
30
https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-nsdi-slicetime-camera_ready_14P.pdf
Online
USENIX
Berkeley, CA, USA
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA
Boston, Massachusetts
en
1
EliasWeingaertner
FlorianSchmidt
Hendrikvom Lehn
TobiasHeer
KlausWehrle
inproceedings
OttHLVK2011
Floating Content: Information Sharing in Urban Areas
2011
3
21
Content sharing using personal web pages, blogs, or online social networks is a common means for people to maintain contact with their friends, colleagues, and acquaintances. While such means are essential to overcome distances, using infrastructure services for location-based services may not be desirable. In this paper, we analyze a fully distributed variant of an ephemeral content sharing service, solely dependent on the mobile devices in the vicinity using principles of opportunistic networking.
The net result is a best effort service for floating content in which: 1) information dissemination is geographically limited; 2) the lifetime and spreading of information depends on interested nodes being available; 3) content can only be created and distributed locally; and 4) content can only be added, but not explicitly deleted. First we present our system design and summarize its analytical modeling. Then we perform extensive evaluation for a map-based mobility model in downtown Helsinki to assess the operational range for floating content, which, at the same time also validate the analytical results obtained for a more abstract model of the system.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-percom-vaegs-floatingcontent.pdf
Online
IEEE
Piscataway, NJ, USA
Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, WA, USA
Seattle, USA
9th IEEE International Conference on Pervasive Computing and Communications
March 21 - 25, 2011
en
978-1-4244-9529-0
1
JörgOtt
EsaHyytiä
PasiLassila
TobiasVaegs
JussiKangasharju
inproceedings
2011-weingaertner-device-driver-enabled
Device-driver enabled Wireless Network Emulation
2011
3
https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-simutools-wifi-emu_camera-ready.pdf
Online
ICST
Brussels, Belgium
Proceedings ot the4th International ICST Conference on Simulation Tools and Techniques (SIMUTools 2011)
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques (SIMUTools 2011), Barcelona, Spain
Barcelona, Spain
accepted
en
978-1-936968-00-8
1
EliasWeingaertner
Hendrikvom Lehn
KlausWehrle
poster
2011-03-vomLehn-NSDI-PrivacyOnWeb
Work in Progress: Uncovering the Privacy Implications of Web Usage [Poster]
2011
3
poster and abstract
fileadmin/papers/2011/2011-03-vomLehn-NSDI-PrivacyOnWeb.pdf
Online
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA
Usenix
Boston, MA, USA
NSDI
March 30 – April 1, 2011
accepted
en
1
Hendrikvom Lehn
Jó AgilaBitsch Link
KlausWehrle
techreport
draft-ietf-hip-cert-08
<prt>Host Identity Protocol Certificates</prt>
2011
1
1
draft-ietf-hip-cert-08.txt
<prt>expires: July 22, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-08
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-08
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-07
<prt>Host Identity Protocol Certificates</prt>
2011
1
1
draft-ietf-hip-cert-07.txt
<prt>expires: July 16, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-07
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-07
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-09
<prt>Host Identity Protocol Certificates</prt>
2011
1
1
draft-ietf-hip-cert-09.txt
1
<prt>expires: July 22, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-09
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-09
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-06
<prt>Host Identity Protocol Certificates</prt>
2010
11
1
draft-ietf-hip-cert-06.txt
<prt>expires: May 23, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-06
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-06
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-05
<prt>Host Identity Protocol Certificates</prt>
2010
11
1
draft-ietf-hip-cert-05.txt
<prt>expires: May 12, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-05
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-05
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-04
<prt>Host Identity Protocol Certificates</prt>
2010
9
1
draft-ietf-hip-cert-04.txt
<prt>expires: March 27, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-04
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-04
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
inproceedings
DBLP:conf/winsys/ChristophKST10a
Automatic Context Detection of a Mobile user
2010
7
189-194
Print
Rafael F. S. Caldeirinha and Mohammad S. Obaidat
SciTePress
WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications
en
978-989-8425-24-9
UtaChristoph
Karl-HeinzKrempels
Jannovon Stülpnagel
ChristophTerwelp
inproceedings
201004vaegsieeestudentpad
Probabilistic Addressing in Wireless Networks
2010
5
20
5-8
The lack of permanent network infrastructure and often unplanned deployments in many multihop wireless communication scenarios restrict nodes to determine their own addresses based on the underlying connectivity in the network. However, due to unreliable connectivity and rapidly changing link qualities in wireless networks, establishing uniform addressing and stable point-to-point routing is challenging. In this paper, we present Statistical Vector Routing (SVR), a virtual coordinates based addressing and routing mechanism that efficiently deals with dynamic communication links in wireless networks. It assigns stable probabilistic addresses to nodes without the need to pessimistically estimate links over longer periods of time. The routing metric predicts the current location of a node in its address distribution. Our prototype implementation over real testbeds indicates that SVR, when compared to current approaches, achieves 3 times more stable addressing, reduces the magnitude of change in addresses by 2-10 times, and minimizes the hop distance and transmissions in the network by 10-15%.
wld
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-vaegs-wehrle-probabilistic_addressing.pdf
Print
Hamburg University of Technology
Hamburg, Germany
Proceedings of the 2nd IEEE Student Conference, Hamburg University of Technology, Hamburg, Germany
Hamburg, Germany
2nd IEEE Student Conference, Hamburg University of Technology
May 20-21, 2010
en
TobiasVaegs
Muhammad HamadAlizai
KlausWehrle
inproceedings
20104-IPSN-alizai-svr
Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks
2010
4
12
366-367
We present Statistical Vector Routing (SVR), a protocol that efficiently deals with communication link dynamics in wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.
wld
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf
http://portal.acm.org/citation.cfm?id=1791257
Print
ACM
New York, NY, USA
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
Stockholm, Sweden
9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
April 12-16, 2010
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
RaimondasSasnauskas
KlausWehrle
inproceedings
201004vaegsjscsvr
Poster: A Statistical Vector based Routing Protocol for Wireless Networks
2010
4
7
279-280
We present Statistical Vector Routing (SVR), a protocol that efficiently deals with the dynamics shown by communication links of wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf
Poster
Print
Hans K. Kaiser and Raimund Kirner
Vienna University of Technology
Karlsplatz 13, 1040 Vienna, Austria
Proceedings of the Junior Scientist Conference 2010, Vienna, Austria
Vienna, Austria
The Junior Scientist Conference
April 7-9, 2010
en
978-3-200-01797-9
TobiasVaegs
KlausWehrle
inproceedings
2010-percomws-heer-munifi
Collaborative Municipal Wi-Fi Networks - Challenges and Opportunities
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), IEEE.
2010
4
2
1
588 - 593
Municipal Wi-Fi networks aim at providing Internet access and selected mobile network services to citizens, travelers, and civil servants. The goals of these networks are to bridge the digital divide, stimulate innovation, support economic growth, and increase city operations efficiency. While establishing such urban networks is financially challenging for municipalities, Wi-Fi-sharing communities accomplish good coverage and ubiquitous Internet access by capitalizing on the dense deployment of private access points in urban residential areas. By combining Wi-Fi communities and municipal Wi-Fi, a collaborative municipal Wi-Fi system promises cheap and ubiquitous access to mobile city services. However, the differences in intent, philosophy, and technical realization between community and municipal Wi-Fi networks prevent a straight-forward combination of both approaches. In this paper, we highlight the conceptual and technical challenges that need to be solved to create collaborative municipal Wi-Fi networks.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-percomws-collaborative-municipal-wi-fi.pdf
Print
IEEE Press
Washington, DC, USA
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany.
Mannheim, Germany
Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010)
April 02, 2010
en
978-1-4244-6605-4
10.1109/PERCOMW.2010.5470505
TobiasHeer
RenéHummen
NicolaiViol
HannoWirtz
StefanGötz
KlausWehrle
techreport
draft-ietf-hip-cert-03
<prt>Host Identity Protocol Certificates</prt>
2010
4
1
draft-ietf-hip-cert-03.txt
<prt>expires: October 30, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
inproceedings
inproceedingsreference201001227195395138
Iterative Source-Channel Decoding with Cross-Layer Support for Wireless VoIP
2010
1
18
1
1-6
This paper presents a cross-layer approach for iterative source-channel decoding (ISCD) in wireless VoIP networks. The novelty of the proposed method is the incorporation of both, speech bits as well as protocol header bits, into the ISCD process. The header bits take the role of pilot bits having perfect reliability. These bits are distributed over the frame as strong supporting points for the MAP decoder which results in a significant enhancement of the output speech quality compared to the benchmark scheme using ISCD for speech only. For this approach, we exploit new cross-layer concepts that support the direct communication between non-adjacent layers. These concepts enable the iterative exchange of extrinsic information between the source decoder located on the application layer and the channel decoder located on the physical layer. This technique can also be applied to audio and video transmission.
refector
fileadmin/papers/2010/2010-01-scc-breddermann-iscd.pdf
CD-ROM / DVD-ROM
Rudolf Mathar, Christoph Ruland
VDE Verlag
Berlin, Germany
Proceedings of International ITG Conference on Source and Channel Coding
Proceedings of International ITG Conference on Source and Channel Coding
ITG
Siegen
International ITG Conference on Source and Channel Coding 2010
January 18-21, 2010
en
978-3-8007-3211-1
1
TobiasBreddermann
HelgeLueders
PeterVary
IsmetAktas
FlorianSchmidt
article
VaegsDHH2010
Learning by gaming: facts and myths
International Journal of Technology Enhanced Learning (IJTEL)
2010
2
1/2
21-40
Gaming has undergone a transition from a niche hobby to a part of everyday culture. This transition, along with the advance in the use of the internet, has created a new kind of social environment, commonly known as virtual life. This paper presents the survey results of over 1000 gamers worldwide, in which they tell us how gaming affected their lives – both virtual and real – with regard to their career, relationships and social life. The analysis of the answers disproves common stereotypes about gamers, shows areas where gaming can very well be beneficial and where there are still problems.
video games, online games, learning by playing, soft skills, transferable skills, motivation, conflicts, social skills, careers, relationships, communities, technical competence, gaming, virtual life, social life, gamers
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-vaegs-JTEL-Gaming.pdf
Martin Wolpers
Inderscience Publishers
Geneva, SWITZERLAND
en
1753-5255
10.1504/IJTEL.2010.031258
1
TobiasVaegs
DarkoDugosija
StephanHackenbracht
AnnaHannemann
inproceedings
200912BitschSimBetAge
SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks
2009
12
1
13--18
In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.
RatPack
fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf
http://portal.acm.org/citation.cfm?id=1659029.1659034&coll=DL&dl=GUIDE&CFID=6806120&CFTOKEN=29162094
http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf
Online
Paulo Mendes, Oliver Marcé
ACM
New York City, NY, USA
U-NET '09
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy
ACM
Rome, Italy
1st ACM workshop on User-provided networking: challenges and opportunities
1 Dec. 2009
en
978-1-60558-750-9
http://doi.acm.org/10.1145/1659029.1659034
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
techreport
draft-ietf-hip-cert-02
<prt>Host Identity Protocol Certificates</prt>
2009
10
1
draft-ietf-hip-cert-02.txt
<prt>expires: April 29, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
inproceedings
200907BitschMOBIQUITOUS09SimBetAge
SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking
2009
7
13
1--2
In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs.
poster and abstract
RatPack
fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363
Online
IEEE
New York City, NY, USA
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada
ICST/IEEE
Toronto, ON, Canada
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)
July 13-16, 2009
en
978-963-9799-59-2
10.4108/ICST.MOBIQUITOUS2009.7017
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
techreport
draft-ietf-hip-cert-01
<prt>Host Identity Protocol Certificates</prt>
2009
6
1
draft-ietf-hip-cert-01.txt
<prt>expires: January 2, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
proceedings
2009-Weingaertner-ICC-NetworkSimulator-Comparison
A performance comparison of recent network simulators
2009
A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. While ns-2 has established itself as virtually the standard network simulation tool, other network simulators have gained more and more attention during the last years. In this paper, we briefly survey new developments in the field of network simulation and conduct a performance comparison study by implementing an identical simulation set-up in five simulators, namely ns-2, OMNet++, ns-3, SimPy and JiST/SWANS. Our results reveal large differences according to both run-time performance and memory usage.
http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-simulator_comparison.pdf
Print
IEEE
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009)
Dresden, Germany
en
1
EliasWeingaertner
Hendrikvom Lehn
KlausWehrle
techreport
2009-heer-draft-service-id
Service Identifiers for HIP
2009
draft-heer-hip-service-00
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables HIP end-hosts and HIP-aware middleboxes to announce services to HIP hosts during a HIP Base EXchange (BEX) or HIP update. Service providers are able to specify the type and requirements of a service; clients can then decide to agree on the terms of service. This allows the service provider to verify the accordance of the client with the service conditions while the client is able to verify the authenticity of the used service.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
SamuVarjonen
HannoWirtz
conference
200810riechelcncerco
Range Queries and Load Balancing in a Hierarchically Structured P2P System
2008
10
14
28-35
Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, are used more and more for file-sharing and content distribution applications. However, a major weakness of traditional DHTs is the search for stored content, as data is assigned to nodes based on hash functions, and the very nature of hash tables allows only exact pattern matches. We present Cerco, a solution for the problem of range queries by using the principles of order-preserving DHTs and a hierarchically structured P2P approach. To guarantee an efficient routing and load balancing, Cerco uses a dynamic hierarchy of DHTs by creating subrings on demand and two explicit load balancing strategies. Our evaluation shows that Cerco is able to achieve the goals of supporting range queries, logarithmic-hop routing, and efficient load balancing.
RWTH Aachen University - Distributed Systems Group
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4664131&arnumber=4664148&count=180&index=16
http://web.informatik.uni-bonn.de/IV/Mitarbeiter/matthew/Mirror_LCN2008_Website/www.ieeelcn.org/
Print
IEEE Press
Proceedings of 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)
IEEE
Montreal, Canada
33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)
14-17 Oct. 2008
en
978-1-4244-2412-2
10.1109/LCN.2008.4664148
1
SimonRieche
Bui TheVinh
KlausWehrle
techreport
draft-ietf-hip-cert-00
<prt>Host Identity Protocol Certificates</prt>
2008
10
1
draft-ietf-hip-cert-00.txt
<prt>expires: January 2, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-00
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-00
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
inproceedings
DugosijaEHVHM2008
Online Gaming as Tool for Career Development
2008
9
16
386
Gaming has undergone a transition from a niche hobby to a part of everyday culture, with the most prominent examples of professional gaming in Korea and the success of World of Warcraft. This transition alongside with the advance of use of the Internet has created a new kind of social environment, commonly known as virtual life. This paper presents an excerpt of the results of a survey investigating this environment with particular regard to the interaction between gaming and career, relationships as well as social groups. “Man only plays when in the full meaning of the word he is a man, and he is only completely a man when he plays. ” Schiller 1
https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-steg-vaegs-gaming.pdf
http://www.slideshare.net/vaegs/online-gaming-as-tool-for-career-development-presentation
Ralf Klamma, Nalin Sharda, Baltasar Fernández-Manjón, Harald Kosch and Marc Spaniol
CEUR Workshop Proceedings
Proceedings of the First International Workshop on Story-Telling and Educational Games (STEG'08)
Maastricht School of Management, Maastricht, The Netherlands
First International Workshop on Story-Telling and Educational Games (STEG'08)
September 16, 2008
en
DarkoDugosija
VadiEfe
StephanHackenbracht
TobiasVaegs
AnnaHannemann
techreport
draft-varjonen-hip-cert-01
<prt>Host Identity Protocol Certificates</prt>
2008
7
1
draft-varjonen-hip-cert-01.txt
<prt>expires: January 15, 2009 (work in progress)</prt>
http://tools.ietf.org/html/draft-varjonen-hip-cert-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-varjonen-hip-cert-00
<prt>Host Identity Protocol Certificates</prt>
2008
2
1
draft-varjonen-hip-cert-01.txt
<prt>expires: August 21, 2008 (work in progress)</prt>
http://tools.ietf.org/html/draft-varjonen-hip-cert-00
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
TobiasHeer
SamuVarjonen
techreport
200807VOMLEHNAIB200816NetworkSimulatorComparison
Comparing recent network simulators: A performance evaluation study
Aachener Informatik Berichte
2008
2008-16
AIB 2008-16
1-28
Ranging from the development of new protocols to validating analytical performance metrics, network simulation is the most prevalent methodology in the field of computer network research. While the well known ns-2 toolkit has established itself as the quasi standard for network simulation, the successors are on their way. In this paper, we first survey recent contributions in the field of network simulation tools as well as related aspects such as parallel network simulation. Moreover, we present preliminary results which compare the resource demands for ns-3, JiST, SimPy and OMNeT++ by implementing the identical simulation scenario in all these network simulation tools.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/AIB-2008-16.pdf
Online
Ahornstr. 55, Aachen, Germany
RWTH Aachen University
Technical Report
0935-3232
Hendrikvom Lehn
EliasWeingaertner
KlausWehrle
techreport
2008-heer-draft-cert-2
HIP Certificates (Version 0)
2008
This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.
Work in progress
Internet Engineering Task Force
Internet-Draft
SamuVarjonen
TobiasHeer
techreport
2008-heer-draft-cert
HIP Certificates (Version 1)
2008
This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.
draft-varjonen-hip-cert-01.txt. Work in progress.
Internet Engineering Task Force
Internet-Draft
SamuVarjonen
TobiasHeer