This file was created by the TYPO3 extension
bib
--- Timezone: CET
Creation date: 2023-12-09
Creation time: 04-11-50
--- Number of references
9
inproceedings
2011-wirtz-kaleidoscope
Cooperative Wi-Fi-Sharing: Encouraging Fair Play
2011
12
14
mobile_access
fileadmin/papers/2011/2011-wirtz-kaleidoscope.pdf
Online
ITU
Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa
Cape Town, South Africa
ITU-T Kaleidoscope: The fully networked human?
2011-12-12
en
978-92-61-13651-2
1
HannoWirtz
RenéHummen
NicolaiViol
TobiasHeer
Mónica AlejandraLora Girón
KlausWehrle
techreport
2011-draft-garcia-core-security-03
Security Considerations in the IP-based Internet of Things
2011
10
31
draft-garcia-core-security-03
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-03
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
article
2011-heer-iot-journal
Security Challenges in the IP-based Internet of Things
Springer Wireless Personal Communications Journal
2011
10
61
3
527-542
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.
iotsec
fileadmin/papers/2011/2011-heer-iot-challenges.pdf
Online
Springer
Netherlands
en
0929-6212
10.1007/s11277-011-0385-5
1
TobiasHeer
OscarGarcia-Morchon
RenéHummen
Sye LoongKeoh
Sandeep S.Kumar
KlausWehrle
inproceedings
2011-wintech-wirtz
Demo: Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode
2011
9
19
89-90
Mobile Ad-Hoc Networks (MANETs) rely on the 802.11 ad- hoc mode to establish communication with nearby peers. In practice, this makes MANETs hard to realize. While 802.11-compliant mobile devices implement the ad-hoc mode on the hardware layer, the software layer typically does not implement support for ad-hoc networking in terms of ad-hoc routing and name resolution protocols. Modern mobile operating systems, such as Android and iOS, even hide the inherent ad-hoc functionality of the wireless card through restrictions in the OS. In contrast to this, support for the 802.11 infrastructure mode is a commodity.
We propose establishing ad-hoc networks using the 802.11 infrastructure mode. In MA-Fi (Mobile Ad-Hoc Wi-Fi), a small core of mobile router nodes (RONs) provides infrastruc-ture mode network access to mobile station nodes (STANs). As RONs also act as a station in infrastructure networks of other RONs, MA-Fi achieves multi-hop communication between RON and STAN devices in the overall network.
We show the creation and operation of mobile ad-hoc networks using MA-Fi. We focus on mobility of RONs and STANs as well as topology control in the overall network.
fileadmin/papers/2011/2011-wirtz-wintech.pdf
Online
ACM
New York, NY, USA
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA
Las Vegas, Nevada, USA
The Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization
2011-09-19
en
978-1-4503-0867-0
10.1145/2030718.2030737
1
HannoWirtz
RobertBackhaus
RenéHummen
KlausWehrle
techreport
2011-draft-garcia-core-security-02
Security Considerations in the IP-based Internet of Things
2011
7
11
draft-garcia-core-security-02
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-02
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
2011-hummen-pisa-demo
PISA-SA - Security and Mobility in a Collaborative Muni-Fi (Demo Abstract)
2011
6
15
15
35--36
mobile_access
fileadmin/papers/2011/2011-hummen-wisec-pisa-sa-demo.pdf
Online
ACM
New York, NY, USA
Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany
Hamburg, Germany
Wireless Network Security 2011 (WiSec 2011)
en
1559-1662
10.1145/2073290.2073297
1
RenéHummen
HannoWirtz
NicolaiViol
TobiasHeer
KlausWehrle
techreport
2011-draft-garcia-core-security-01
Security Considerations in the IP-based Internet of Things
2011
3
14
draft-garcia-core-security-01
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-01
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2011-draft-garcia-core-security-00
Security Considerations in the IP-based Internet of Things
2011
3
7
draft-garcia-core-security-00
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-00
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2011-heer-draft-middle-auth
End-Host Authentication for HIP Middleboxes (Version 4)
2011
draft-heer-hip-middle-auth-04
The Host Identity Protocol [RFC5201] is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension allows middleboxes to verify the liveness and freshness of a HIP association and, thus, to secure access control in middleboxes.
Work in progress
ietf, mobile_access
http://tools.ietf.org/html/draft-heer-hip-middle-auth-04
Online
Internet Engineering Task Force
Internet-Draft
en
TobiasHeer
MiikaKomu
RenéHummen
KlausWehrle