% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-26 % Creation time: 07-13-37 % --- Number of references % 153 % @Inproceedings { 2024-kunze-civic, title = {In-Situ Model Validation for Continuous Processes Using In-Network Computing}, year = {2024}, month = {5}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-kunze-civic.pdf}, booktitle = {Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '24)}, state = {accepted}, reviewed = {1}, author = {Kunze, Ike and Scheurenberg, Dominik and Tirpitz, Liam and Geisler, Sandra and Wehrle, Klaus} } @Poster { 2024-dahlmanns-sul, title = {Poster: Trusted Execution Environment-basierte Sicherheit für digitale Umspannwerke}, year = {2024}, month = {3}, day = {5}, number = {19}, tags = {ven2us}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-dahlmanns-slt.pdf}, organization = {VDE ETG/FNN-Tutorial 2024 Schutz- und Leittechnik, March 05-06, 2024, Leipzig, Germany}, event_place = {Leipzig, Germany}, event_name = {VDE ETG/FNN-Tutorial 2024 Schutz- und Leittechnik}, event_date = {March 05-06, 2024}, reviewed = {1}, author = {Dahlmanns, Markus and Wark, Andreas and Genzel, Carl-Heinz and Wehrle, Klaus} } @Article { 2024_pennekamp_supply-chain-survey, title = {An Interdisciplinary Survey on Information Flows in Supply Chains}, journal = {ACM Computing Surveys}, year = {2024}, month = {2}, day = {1}, volume = {56}, number = {2}, abstract = {Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.}, keywords = {information flows; data communication; supply chain management; data security; data sharing; systematic literature review}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf}, publisher = {ACM}, ISSN = {0360-0300}, DOI = {10.1145/3606693}, reviewed = {1}, author = {Pennekamp, Jan and Matzutt, Roman and Klinkm{\"u}ller, Christopher and Bader, Lennart and Serror, Martin and Wagner, Eric and Malik, Sidra and Spi{\ss}, Maria and Rahn, Jessica and G{\"u}rpinar, Tan and Vlad, Eduard and Leemans, Sander J. J. and Kanhere, Salil S. and Stich, Volker and Wehrle, Klaus} } @Article { 2023_pennekamp_purchase_inquiries, title = {Offering Two-Way Privacy for Evolved Purchase Inquiries}, journal = {ACM Transactions on Internet Technology}, year = {2023}, month = {11}, day = {17}, volume = {23}, number = {4}, abstract = {Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today's established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches' scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.}, keywords = {bootstrapping procurement; secure industrial collaboration; private set intersection; homomorphic encryption; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-purchase-inquiries.pdf}, publisher = {ACM}, ISSN = {1533-5399}, DOI = {10.1145/3599968}, reviewed = {1}, author = {Pennekamp, Jan and Dahlmanns, Markus and Fuhrmann, Frederik and Heutmann, Timo and Kreppein, Alexander and Grunert, Dennis and Lange, Christoph and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2023-redefine-mpc-cosimulation, title = {Delay-aware Model Predictive Control for Fast Frequency Control}, journal = {Proceedings of the 14th IEEE International Conference on Smart Grid Communications (SmartGridComm 2023)}, year = {2023}, month = {10}, tags = {redefine}, publisher = {IEEE}, booktitle = {Proceedings of the 14th IEEE International Conference on Smart Grid Communications (SmartGridComm 2023)}, state = {accepted}, reviewed = {1}, author = {Heins, Tobias and Glebke, Ren{\'e} and Stoffers, Mirko and Gurumurthy, Sriram and Heesemann, Jan and Josevski, Martina and Monti, Antonello and Wehrle, Klaus} } @Article { Jakobs_2023_3, title = {Preserving the Royalty-Free Standards Ecosystem}, journal = {European Intellectual Property Review}, year = {2023}, month = {7}, volume = {45}, number = {7}, pages = {371-375}, abstract = {It has long been recognized in Europe and elsewhere that standards-development organizations (SDOs) may adopt policies that require their participants to license patents essential to the SDO’s standards (standards-essential patents or SEPs) to manufacturers of standardized products (“implementers”) on a royalty-free (RF) basis. This requirement contrasts with SDO policies that permit SEP holders to charge implementers monetary patent royalties, sometimes on terms that are specified as “fair, reasonable and nondiscriminatory” (FRAND). As demonstrated by two decades of intensive litigation around the world, FRAND royalties have given rise to intractable disputes regarding the manner in which such royalties should be calculated and adjudicated. In contrast, standards distributed on an RF basis are comparatively free from litigation and the attendant transaction costs. Accordingly, numerous SDOs around the world have adopted RF licensing policies and many widely adopted standards, including Bluetooth, USB, IPv6, HTTP, HTML and XML, are distributed on an RF basis. This note briefly discusses the commercial considerations surrounding RF standards, the relationship between RF standards and open source software (OSS) and the SDO policy mechanisms – including “universal reciprocity” -- that enable RF licensing to succeed in the marketplace.}, ISSN = {0142-0461}, DOI = {10.2139/ssrn.4235647}, reviewed = {1}, author = {Contreras, Jorge and Bekkers, Rudi and Biddle, Brad and Bonadio, Enrico and Carrier, Michael A. and Chao, Bernard and Duan, Charles and Gilbert, Richard and Henkel, Joachim and Hovenkamp, Erik and Husovec, Martin and Jakobs, Kai and Kim, Dong-hyu and Lemley, Mark A. and Love, Brian J. and McDonagh, Luke and Scott Morton, Fiona M. and Schultz, Jason and Simcoe, Timothy and Urban, Jennifer M. and Xiang, Joy Y} } @Inproceedings { 2023-grote-mvca-fairness, title = {Instant Messaging Meets Video Conferencing: Studying the Performance of IM Video Calls}, year = {2023}, month = {6}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-grote-mvca-fairness.pdf}, publisher = {IFIP/IEEE}, booktitle = {Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '23)}, ISBN = {978-3-903176-58-4}, DOI = {10.23919/TMA58422.2023.10199019}, reviewed = {1}, author = {Grote, Laurenz and Kunze, Ike and Sander, Constantin and Wehrle, Klaus} } @Incollection { 2023_pennekamp_crd-a.i, title = {Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead}, year = {2023}, month = {2}, day = {8}, pages = {35-60}, abstract = {The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.}, keywords = {Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_2}, reviewed = {1}, author = {Pennekamp, Jan and Belova, Anastasiia and Bergs, Thomas and Bodenbenner, Matthias and B{\"u}hrig-Polaczek, Andreas and Dahlmanns, Markus and Kunze, Ike and Kr{\"o}ger, Moritz and Geisler, Sandra and Henze, Martin and L{\"u}tticke, Daniel and Montavon, Benjamin and Niemietz, Philipp and Ortjohann, Lucia and Rudack, Maximilian and Schmitt, Robert H. and Vroomen, Uwe and Wehrle, Klaus and Zeng, Michael} } @Incollection { 2023_klugewilkes_crd-b2.iv, title = {Modular Control and Services to Operate Line-less Mobile Assembly Systems}, year = {2023}, month = {2}, day = {8}, pages = {303-328}, abstract = {The increasing product variability and lack of skilled workers demand for autonomous, flexible production. Since assembly is considered a main cost driver and accounts for a major part of production time, research focuses on new technologies in assembly. The paradigm of Line-less Mobile Assembly Systems (LMAS) provides a solution for the future of assembly by mobilizing all resources. Thus, dynamic product routes through spatiotemporally configured assembly stations on a shop floor free of fixed obstacles are enabled. In this chapter, we present research focal points on different levels of LMAS, starting with the macroscopic level of formation planning, followed by the mesoscopic level of mobile robot control and multipurpose input devices and the microscopic level of services, such as interpreting autonomous decisions and in-network computing. We provide cross-level data and knowledge transfer through a novel ontology-based knowledge management. Overall, our work contributes to future safe and predictable human-robot collaboration in dynamic LMAS stations based on accurate online formation and motion planning of mobile robots, novel human-machine interfaces and networking technologies, as well as trustworthy AI-based decisions.}, keywords = {Lineless mobile assembly systems (LMAS); Formation planning; Online motion planning; In-network computing; Interpretable AI; Human-machine collaboration; Ontology-based knowledge management}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-klugewilkes-iop-b2.iv.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_13}, reviewed = {1}, author = {Kluge-Wilkes, Aline and Baier, Ralph and Gossen, Daniel and Kunze, Ike and M{\"u}ller, Aleksandra and Shahidi, Amir and Wolfschl{\"a}ger, Dominik and Brecher, Christian and Corves, Burkhard and H{\"u}sing, Mathias and Nitsch, Verena and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2022-wireless-anycast, title = {Harnessing Cooperative Anycast Communication for Increased Resilience in Wireless Control}, journal = {Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)}, year = {2022}, month = {12}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-glebke-wireless-anycast.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)}, DOI = {10.1109/CDC51059.2022.9992864}, reviewed = {1}, author = {Glebke, Ren{\'e} and Scheiper, Jan and Lenz, Stefan and Stoffers, Mirko and Wehrle, Klaus} } @Techreport { draft-irtf-coinrg-use-cases-02, title = {Use Cases for In-Network Computing}, year = {2022}, month = {3}, number = {draft-irtf-coinrg-use-cases-02}, note = {expires: 8 September 2022 (work in progress)}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf}, web_url = {https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/}, misc2 = {Online}, publisher = {IETF Trust}, series = {Internet Drafts}, organization = {Internet Engineering Task Force}, institution = {Internet Engineering Task Force}, author = {Kunze, Ike and Wehrle, Klaus and Trossen, Dirk and Montpetit, Marie-Jos{\'e} and de Foy, Xavier and Griffin, David and Rio, Miguel} } @Inproceedings { 2021_pennekamp_bootstrapping, title = {Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships}, year = {2021}, month = {11}, day = {15}, number = {RWTH-2021-09499}, abstract = {In addition to quality improvements and cost reductions, dynamic and flexible business relationships are expected to become more important in the future to account for specific customer change requests or small-batch production. Today, despite reservation, sensitive information must be shared upfront between buyers and sellers. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness following information leaks or breaches of their privacy. To address this issue, the concepts of confidential computing and cloud computing come to mind as they promise to offer scalable approaches that preserve the privacy of participating companies. In particular, designs building on confidential computing can help to technically enforce privacy. Moreover, cloud computing constitutes an elegant design choice to scale these novel protocols to industry needs while limiting the setup and management overhead for practitioners. Thus, novel approaches in this area can advance the status quo of bootstrapping new relationships as they provide privacy-preserving alternatives that are suitable for immediate deployment.}, keywords = {bootstrapping procurement; business relationships; secure industrial collaboration; privacy; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-bootstrapping.pdf}, publisher = {RWTH Aachen University}, booktitle = {Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea}, institution = {RWTH Aachen University}, event_place = {Seoul, Korea}, event_date = {November 14, 2021}, DOI = {10.18154/RWTH-2021-09499}, author = {Pennekamp, Jan and Fuhrmann, Frederik and Dahlmanns, Markus and Heutmann, Timo and Kreppein, Alexander and Grunert, Dennis and Lange, Christoph and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2021-kunze-signal-detection, title = {Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing}, year = {2021}, month = {6}, day = {10}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-signal-detection.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE)}, ISBN = {978-1-7281-9023-5}, ISSN = {2163-5145}, DOI = {10.1109/ISIE45552.2021.9576221}, reviewed = {1}, author = {Kunze, Ike and Niemietz, Philipp and Tirpitz, Liam and Glebke, Ren{\'e} and Trauth, Daniel and Bergs, Thomas and Wehrle, Klaus} } @Inproceedings { 2021-glebke-service-based-forwarding, title = {Service-based Forwarding via Programmable Dataplanes}, year = {2021}, month = {6}, day = {10}, tags = {reflexes}, url = {/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)}, ISBN = {978-1-6654-4005-9}, ISSN = {2325-5609}, DOI = {10.1109/HPSR52026.2021.9481814}, reviewed = {1}, author = {Glebke, Ren{\'e} and Trossen, Dirk and Kunze, Ike and Lou, David and R{\"u}th, Jan and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2021_mangel_reshare, title = {Data Reliability and Trustworthiness through Digital Transmission Contracts}, year = {2021}, month = {6}, day = {8}, volume = {12731}, pages = {265-283}, abstract = {As decision-making is increasingly data-driven, trustworthiness and reliability of the underlying data, e.g., maintained in knowledge graphs or on the Web, are essential requirements for their usability in the industry. However, neither traditional solutions, such as paper-based data curation processes, nor state-of-the-art approaches, such as distributed ledger technologies, adequately scale to the complex requirements and high throughput of continuously evolving industrial data. Motivated by a practical use case with high demands towards data trustworthiness and reliability, we identify the need for digitally-verifiable data immutability as a still insufficiently addressed dimension of data quality. Based on our discussion of shortcomings in related work, we thus propose ReShare, our novel concept of digital transmission contracts with bilateral signatures, to address this open issue for both RDF knowledge graphs and arbitrary data on the Web. Our quantitative evaluation of ReShare’s performance and scalability reveals only moderate computation and communication overhead, indicating significant potential for cost-reductions compared to today’s approaches. By cleverly integrating digital transmission contracts with existing Web-based information systems, ReShare provides a promising foundation for data sharing and reuse in Industry 4.0 and beyond, enabling digital accountability through easily-adoptable digitally-verifiable data immutability and non-repudiation.}, note = {Lecture Notes in Computer Science (LNCS), Volume 12731}, keywords = {Digital transmission contracts; Trust; Data immutability; Non-repudiation; Accountability; Data dynamics; Linked Data; Knowledge graphs}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mangel-eswc-reshare.pdf}, publisher = {Springer}, booktitle = {Proceedings of the 18th Extended Semantic Web Conference (ESWC '21), June 6-10, 2021, Heraklion, Greece}, event_place = {Heraklion, Greece}, event_date = {June 6-10, 2021}, ISBN = {978-3-030-77384-7}, ISSN = {0302-9743}, DOI = {10.1007/978-3-030-77385-4_16}, reviewed = {1}, author = {Mangel, Simon and Gleim, Lars and Pennekamp, Jan and Wehrle, Klaus and Decker, Stefan} } @Inproceedings { 2021_gleim_factstack, title = {FactStack: Interoperable Data Management and Preservation for the Web and Industry 4.0}, year = {2021}, month = {5}, day = {31}, volume = {P-312}, pages = {371-395}, abstract = {Data exchange throughout the supply chain is essential for the agile and adaptive manufacturing processes of Industry 4.0. As companies employ numerous, frequently mutually incompatible data management and preservation approaches, interorganizational data sharing and reuse regularly requires human interaction and is thus associated with high overhead costs. An interoperable system, supporting the unified management, preservation and exchange of data across organizational boundaries is missing to date. We propose FactStack, a unified approach to data management and preservation based upon a novel combination of existing Web-standards and tightly integrated with the HTTP protocol itself. Based on the FactDAG model, FactStack guides and supports the full data lifecycle in a FAIR and interoperable manner, independent of individual software solutions and backward-compatible with existing resource oriented architectures. We describe our reference implementation of the approach and evaluate its performance, showcasing scalability even to high-throughput applications. We analyze the system's applicability to industry using a representative real-world use case in aircraft manufacturing based on principal requirements identified in prior work. We conclude that FactStack fulfills all requirements and provides a promising solution for the on-demand integration of persistence and provenance into existing resource-oriented architectures, facilitating data management and preservation for the agile and interorganizational manufacturing processes of Industry 4.0. Through its open source distribution, it is readily available for adoption by the community, paving the way for improved utility and usability of data management and preservation in digital manufacturing and supply chains.}, note = {Lecture Notes in Informatics (LNI), Volume P-312}, keywords = {Web Technologies; Data Management; Memento; Persistence; PID; Industry 4.0}, tags = {internet-of-production}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2021/2021-gleim-btw-iop-interoperability-realization.pdf}, publisher = {Gesellschaft f{\"u}r Informatik}, booktitle = {Proceedings of the 19th Symposium for Database Systems for Business, Technology and Web (BTW '21), September 13-17, 2021, Dresden, Germany}, event_place = {Dresden, Germany}, event_date = {September 13-17, 2021}, ISBN = {978-3-88579-705-0}, ISSN = {1617-5468}, DOI = {10.18420/btw2021-20}, reviewed = {1}, author = {Gleim, Lars and Pennekamp, Jan and Tirpitz, Liam and Welten, Sascha and Brillowski, Florian and Decker, Stefan} } @Inproceedings { 2021-kunze-coordinate-transformation, title = {Investigating the Applicability of In-Network Computing to Industrial Scenarios}, year = {2021}, month = {5}, day = {11}, pages = {334-340}, keywords = {in-network computing; latency; approximation}, tags = {internet-of-production,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21)}, ISBN = {978-1-7281-6207-2}, DOI = {10.1109/ICPS49255.2021.9468247}, reviewed = {1}, author = {Kunze, Ike and Glebke, Ren{\'e} and Scheiper, Jan and Bodenbenner, Matthias and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2021-kunze-aqm-tofino-p4, title = {Tofino + P4: A Strong Compound for AQM on High-Speed Networks?}, year = {2021}, month = {5}, pages = {72-80}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf}, publisher = {IFIP/IEEE}, booktitle = {Proceedings of the International Symposium on Integrated Network Management (IM '21)}, event_place = {Virtual Event}, event_name = {International Symposium on Integrated Network Management (IM '21)}, event_date = {May 2021}, ISBN = {978-1-7281-9041-9}, reviewed = {1}, author = {Kunze, Ike and Gunz, Moritz and Saam, David and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2020_gleim_factdag_provenance, title = {Expressing FactDAG Provenance with PROV-O}, year = {2020}, month = {11}, day = {1}, volume = {2821}, pages = {53-58}, abstract = {To foster data sharing and reuse across organizational boundaries, provenance tracking is of vital importance for the establishment of trust and accountability, especially in industrial applications, but often neglected due to associated overhead. The abstract FactDAG data interoperability model strives to address this challenge by simplifying the creation of provenance-linked knowledge graphs of revisioned (and thus immutable) resources. However, to date, it lacks a practical provenance implementation. In this work, we present a concrete alignment of all roles and relations in the FactDAG model to the W3C PROV provenance standard, allowing future software implementations to directly produce standard-compliant provenance information. Maintaining compatibility with existing PROV tooling, an implementation of this mapping will pave the way for practical FactDAG implementations and deployments, improving trust and accountability for Open Data through simplified provenance management.}, keywords = {Provenance; Data Lineage; Open Data; Semantic Web Technologies; Ontology Alignment; PROV; RDF; Industry 4.0; Internet of Production; IIoT}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-factdag-provenance.pdf}, publisher = {CEUR Workshop Proceedings}, booktitle = {Proceedings of the 6th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW '20), co-located with the 19th International Semantic Web Conference (ISWC '20), November 1-6, 2020, Athens, Greece,}, event_place = {Athens, Greece}, event_date = {November 1-6, 2020}, ISSN = {1613-0073}, reviewed = {1}, author = {Gleim, Lars and Tirpitz, Liam and Pennekamp, Jan and Decker, Stefan} } @Inproceedings { 2020-kirchhof-wowmom-ccncps, title = {Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation}, year = {2020}, month = {8}, day = {31}, tags = {internet-of-production, reflexes}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kirchhof-wireless-mac-improvements.pdf}, publisher = {IEEE Computer Society}, howpublished = {online}, booktitle = {International Symposium on a World of Wireless, Mobile and Multimedia Networks: Workshop on Communication, Computing, and Networking in Cyber Physical Systems (WoWMoM-CCNCPS'2020), August 31 - September 3, 2020, Cork, Ireland}, event_place = {Cork, Ireland}, event_date = {August 31 - September 3, 2020}, DOI = {10.1109/WoWMoM49955.2020.00068}, reviewed = {1}, author = {Kirchhof, J{\"o}rg Christian and Serror, Martin and Glebke, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2020-serror-networking-qwin, title = {QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation}, year = {2020}, month = {6}, day = {21}, tags = {consent}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-serror-qwin.pdf}, web_url = {https://ieeexplore.ieee.org/abstract/document/9142792}, publisher = {IFIP}, howpublished = {online}, booktitle = {Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France}, event_place = {Paris, France}, event_name = {IFIP NETWORKING Conference}, event_date = {June 22-26, 2020}, ISBN = {978-3-903176-28-7}, reviewed = {1}, author = {Serror, Martin and Wagner, Eric and Glebke, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2020-mann-ur-weldseamstudy, title = {Study on weld seam geometry control for connected gas metal arc welding systems}, year = {2020}, month = {6}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf}, booktitle = {Proceedings of the 2020 Internal Conference on Ubiquitous Robots}, event_name = {Internal Conference on Ubiquitous Robots}, event_date = {June 22-26, 2020}, DOI = {10.1109/UR49135.2020.9144839}, reviewed = {1}, author = {Mann, Samuel and Glebke, Ren{\'e} and Kunze, Ike and Scheurenberg, Dominik and Sharma, Rahul and Reisgen, Uwe and Wehrle, Klaus and Abel, Dirk} } @Article { 2020_gleim_factDAG, title = {FactDAG: Formalizing Data Interoperability in an Internet of Production}, journal = {IEEE Internet of Things Journal}, year = {2020}, month = {4}, day = {14}, volume = {7}, number = {4}, pages = {3243-3253}, abstract = {In the production industry, the volume, variety and velocity of data as well as the number of deployed protocols increase exponentially due to the influences of IoT advances. While hundreds of isolated solutions exist to utilize this data, e.g., optimizing processes or monitoring machine conditions, the lack of a unified data handling and exchange mechanism hinders the implementation of approaches to improve the quality of decisions and processes in such an interconnected environment. The vision of an Internet of Production promises the establishment of a Worldwide Lab, where data from every process in the network can be utilized, even interorganizational and across domains. While numerous existing approaches consider interoperability from an interface and communication system perspective, fundamental questions of data and information interoperability remain insufficiently addressed. In this paper, we identify ten key issues, derived from three distinctive real-world use cases, that hinder large-scale data interoperability for industrial processes. Based on these issues we derive a set of five key requirements for future (IoT) data layers, building upon the FAIR data principles. We propose to address them by creating FactDAG, a conceptual data layer model for maintaining a provenance-based, directed acyclic graph of facts, inspired by successful distributed version-control and collaboration systems. Eventually, such a standardization should greatly shape the future of interoperability in an interconnected production industry.}, keywords = {Data Management; Data Versioning; Interoperability; Industrial Internet of Things; Worldwide Lab}, tags = {internet-of-production}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-iotj-iop-interoperability.pdf}, publisher = {IEEE}, ISSN = {2327-4662}, DOI = {10.1109/JIOT.2020.2966402}, reviewed = {1}, author = {Gleim, Lars and Pennekamp, Jan and Liebenberg, Martin and Buchsbaum, Melanie and Niemietz, Philipp and Knape, Simon and Epple, Alexander and Storms, Simon and Trauth, Daniel and Bergs, Thomas and Brecher, Christian and Decker, Stefan and Lakemeyer, Gerhard and Wehrle, Klaus} } @Inproceedings { 2019-glebke-in-network-cv, title = {Towards Executing Computer Vision Functionality on Programmable Network Devices}, year = {2019}, month = {12}, day = {9}, tags = {reflexes,maki,internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)}, language = {en}, ISBN = {978-1-4503-7000-4/19/12}, DOI = {10.1145/3359993.3366646}, reviewed = {1}, author = {Glebke, Ren{\'e} and Krude, Johannes and Kunze, Ike and R{\"u}th, Jan and Senger, Felix and Wehrle, Klaus} } @Inproceedings { 2019_pennekamp_securityConsiderations, title = {Security Considerations for Collaborations in an Industrial IoT-based Lab of Labs}, year = {2019}, month = {12}, day = {4}, abstract = {The productivity and sustainability advances for (smart) manufacturing resulting from (globally) interconnected Industrial IoT devices in a lab of labs are expected to be significant. While such visions introduce opportunities for the involved parties, the associated risks must be considered as well. In particular, security aspects are crucial challenges and remain unsolved. So far, single stakeholders only had to consider their local view on security. However, for a global lab, we identify several fundamental research challenges in (dynamic) scenarios with multiple stakeholders: While information security mandates that models must be adapted wrt. confidentiality to address these new influences on business secrets, from a network perspective, the drastically increasing amount of possible attack vectors challenges today's approaches. Finally, concepts addressing these security challenges should provide backwards compatibility to enable a smooth transition from today's isolated landscape towards globally interconnected IIoT environments.}, keywords = {secure industrial collaboration; interconnected cyber-physical systems; stakeholders; Internet of Production}, tags = {internet-of-production; iotrust}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-security-considerations.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 3rd IEEE Global Conference on Internet of Things (GCIoT '19), December 4–7, 2019, Dubai, United Arab Emirates}, event_place = {Dubai, United Arab Emirates}, event_date = {December 4–7, 2019}, ISBN = {978-1-7281-4873-1}, DOI = {10.1109/GCIoT47977.2019.9058413}, reviewed = {1}, author = {Pennekamp, Jan and Dahlmanns, Markus and Gleim, Lars and Decker, Stefan and Wehrle, Klaus} } @Inproceedings { 2019_pennekamp_infrastructure, title = {Towards an Infrastructure Enabling the Internet of Production}, year = {2019}, month = {5}, day = {8}, pages = {31-37}, abstract = {New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.}, keywords = {Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW}, event_place = {Taipei, TW}, event_date = {May 6-9, 2019}, ISBN = {978-1-5386-8500-6/19}, DOI = {10.1109/ICPHYS.2019.8780276}, reviewed = {1}, author = {Pennekamp, Jan and Glebke, Ren{\'e} and Henze, Martin and Meisen, Tobias and Quix, Christoph and Hai, Rihan and Gleim, Lars and Niemietz, Philipp and Rudack, Maximilian and Knape, Simon and Epple, Alexander and Trauth, Daniel and Vroomen, Uwe and Bergs, Thomas and Brecher, Christian and B{\"u}hrig-Polaczek, Andreas and Jarke, Matthias and Wehrle, Klaus} } @Article { 2019_henze_flexible_netzwerkstrukturen_iop, title = {Flexible Netzwerkarchitekturen f{\"u}r das Internet of Production}, journal = {ITG-news}, year = {2019}, month = {4}, volume = {02/2019}, pages = {7-8}, tags = {internet-of-production,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-henze-itg-iop-networkarchitectures.pdf}, publisher = {Informationstechnische Gesellschaft im VDE}, address = {Frankfurt am Main}, author = {Henze, Martin and Glebke, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2019-glebke-wirelessgain, title = {Enabling Wireless Network Support for Gain Scheduled Control}, year = {2019}, month = {3}, day = {25}, tags = {reflexes,spp}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf}, publisher = {ACM}, booktitle = {In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)}, event_place = {Dresden, Germany}, event_name = {International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)}, event_date = {25.03.2019}, DOI = {10.1145/3301418.3313943}, reviewed = {1}, author = {Gallenm{\"u}ller, Sebastian and Glebke, Ren{\'e} and G{\"u}nther, Stephan and Hauser, Eric and Leclaire, Maurice and Reif, Stefan and R{\"u}th, Jan and Schmidt, Andreas and Carle, Georg and Herfet, Thorsten and Schr{\"o}der-Preikschat, Wolfgang and Wehrle, Klaus} } @Inproceedings { 2019-glebke-hicss-integrated, title = {A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems}, year = {2019}, month = {1}, day = {8}, pages = {7252-7261}, tags = {internet-of-production,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-integrated.pdf}, misc2 = {Online}, publisher = {University of Hawai'i at Manoa / AIS}, booktitle = {Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA}, language = {en}, ISBN = {978-0-9981331-2-6}, DOI = {10.24251/HICSS.2019.871}, reviewed = {1}, author = {Glebke, Ren{\'e} and Henze, Martin and Wehrle, Klaus and Niemietz, Philipp and Trauth, Daniel and Mattfeld, Patrick and Bergs, Thomas} } @Inproceedings { 2018-tzimmermann-toplists, title = {A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists}, year = {2018}, month = {10}, day = {31}, tags = {maki}, url = {https://dl.acm.org/citation.cfm?id=3278574}, web_url = {https://arxiv.org/abs/1805.11506}, publisher = {ACM}, booktitle = {Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA}, event_place = {Boston, US}, event_name = {Internet Measurement Conference 2018}, event_date = {31.10.18 - 2.11.18}, language = {en}, DOI = {10.1145/3278532.3278574}, reviewed = {1}, author = {Scheitle, Quirin and Hohlfeld, Oliver and Gamba, Julien and Jelten, Jonas and Zimmermann, Torsten and Strowes, Stephen D. and Vallina-Rodriguez, Narseo} } @Inproceedings { 2018-rueth-reflexnetcompute, title = {Towards In-Network Industrial Feedback Control}, year = {2018}, month = {8}, day = {20}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexnetcompute.pdf}, publisher = {ACM}, booktitle = {Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18)}, event_place = {Budapest, Hungary}, event_name = {ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute 2018)}, event_date = {20.08.2018}, DOI = {10.1145/3229591.3229592}, reviewed = {1}, author = {R{\"u}th, Jan and Glebke, Ren{\'e} and Wehrle, Klaus and Causevic, Vedad and Hirche, Sandra} } @Article { 2018-serror-tvt-fb, title = {Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks}, journal = {IEEE Transactions on Vehicular Technology}, year = {2018}, month = {7}, volume = {67}, number = {7}, pages = {5778-5792}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-tvt-fbl-performance.pdf}, publisher = {IEEE}, howpublished = {online}, ISSN = {0018-9545}, DOI = {10.1109/TVT.2018.2794178}, reviewed = {1}, author = {Hu, Yulin and Serror, Martin and Wehrle, Klaus and Gross, James} } @Inproceedings { 2018-serror-wowmom-relaying, title = {Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency}, year = {2018}, month = {6}, day = {11}, tags = {iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-wowmom-relaying.pdf}, publisher = {IEEE}, howpublished = {online}, booktitle = {19th IEEE International Symposium on ''A World of Wireless, Mobile and Multimedia Networks'' (IEEE WoWMoM 2018), Chania, Greece}, event_place = {Chania, Crete, Greece}, event_name = {WoWMoM}, event_date = {June 12-15, 2018}, ISBN = {978-1-5386-4725-7}, DOI = {10.1109/WoWMoM.2018.8449807}, reviewed = {1}, author = {Serror, Martin and Vaa{\ss}en, Sebastian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2018-rueth-reflexdemo, title = {Demo: Towards In-Network Processing for Low-Latency Industrial Control}, year = {2018}, month = {4}, day = {15}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexdemo.pdf}, publisher = {IEEE Computer Society}, booktitle = {In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications}, event_place = {Honolulu, HI, USA}, event_name = {International Conference on Computer Communications (INFOCOM)}, event_date = {15.04.2018 - 19.04.2018}, language = {en}, DOI = {10.1109/INFCOMW.2018.8406844}, reviewed = {1}, author = {R{\"u}th, Jan and Glebke, Ren{\'e} and Ulmen, Tanja and Wehrle, Klaus} } @Inproceedings { 2018-cpsbench-schemmel-equiv, title = {Towards Benchmark Optimization by Automated Equivalence Detection}, year = {2018}, month = {4}, day = {10}, tags = {symbiosys,reflexes}, url = {file:2196}, booktitle = {Proceedings of the 1st Workshop on Benchmarking Cyber-Physical Networks and Systems (CPSBench'18)}, event_place = {Porto, Portugal}, event_name = {1st Workshop on Benchmarking Cyber-Physical Networks and Systems}, event_date = {2018-04-10}, ISBN = {978-1-5386-6742-2}, DOI = {10.1109/CPSBench.2018.00011}, reviewed = {1}, author = {Schemmel, Daniel and Glebke, Ren{\'e} and Stoffers, Mirko and Wehrle, Klaus} } @Article { 2018-scheitle-ccr-caa, title = {A First Look at Certification Authority Authorization (CAA)}, journal = {ACM SIGCOMM Computer Communications Review (CCR)}, year = {2018}, month = {4}, volume = {48}, pages = {10-23}, note = {https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf}, tags = {internet-measurements}, url = {https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf}, web_url = {https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/}, web_url_date = {2018-06-05}, DOI = {10.1145/3213232.3213235}, reviewed = {1}, author = {Scheitle, Quirin and Chung, Taejoong and Hiller, Jens and Gasser, Oliver and Naab, Johannes and van Rijswijk-Deij, Roland and Hohlfeld, Oliver and Holz, Ralph and Choffnes, Dave and Mislove, Alan and Carle, Georg} } @Article { 2016-fgcs-ziegeldorf-bitcoin, title = {Secure and anonymous decentralized Bitcoin mixing}, journal = {Future Generation Computer Systems}, year = {2018}, month = {3}, volume = {80}, pages = {448-466}, keywords = {Pseudonymity, anonymity, and untraceability}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf}, misc2 = {Online}, publisher = {Elsevier}, language = {en}, ISSN = {0167-739X}, DOI = {10.1016/j.future.2016.05.018}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Matzutt, Roman and Henze, Martin and Grossmann, Fred and Wehrle, Klaus} } @Article { dombrowski-vdi, title = {Funktechnologien f{\"u}r Industrie 4.0}, journal = {VDE Positionspapier}, year = {2017}, month = {6}, day = {1}, publisher = {VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.}, address = {Stresemannallee 15, 60596 Frankfurt am Main, Germany}, author = {Aktas, Ismet and Bentkus, Alexander and Bonanati, Florian and Dekorsy, Armin and Dombrowski, Christian and Doubrava, Michael and Golestani, Ali and Hofmann, Frank and Heidrich, Mike and Hiensch, Stefan and Kays, R{\"u}diger and Meyer, Michael and M{\"u}ller, Andreas and ten Brink, Stephan and Petreska, Neda and Popovic, Milan and Rauchhaupt, Lutz and Saad, Ahmad and Schotten, Hans and W{\"o}ste, Christoph and Wolff, Ingo} } @Inproceedings { 2017-serror-pads-cows, title = {Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping}, year = {2017}, month = {5}, day = {24}, tags = {memosim,symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-pads-cows.pdf}, publisher = {ACM}, howpublished = {online}, booktitle = {Proceedings of the 5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17), Singapore, Singapore}, event_place = {Singapore, Singapore}, event_name = {5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17)}, event_date = {May 24-26, 2017}, ISBN = {978-1-4503-4489-0}, DOI = {10.1145/3064911.3064913}, reviewed = {1}, author = {Serror, Martin and Kirchhof, J{\"o}rg Christian and Stoffers, Mirko and Wehrle, Klaus and Gross, James} } @Inproceedings { 2017-serror-ew-koi, title = {From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication}, year = {2017}, month = {5}, day = {17}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-radio-design-ew17.pdf}, publisher = {IEEE}, booktitle = {Proc. of 23rd European Wireless Conference (EW17), Dresden, Germany}, event_place = {Dresden, Germany}, event_name = {Proc. of 23rd European Wireless Conference (EW17)}, event_date = {17.-19. May 2017}, reviewed = {1}, author = {Ashraf, Shehzad Ali and Wang, Y.-P. Eric and Eldessoki, Sameh and Holfeld, Bernd and Parruca, Donald and Serror, Martin and Gross, James} } @Proceedings { 2017-serror-netsys-industrial, title = {Demo: A Realistic Use-case for Wireless Industrial Automation and Control}, year = {2017}, month = {3}, day = {16}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/Ansari_et_al_Wireless_Industrial_Automation_Demo_NetSys_2017.pdf}, publisher = {IEEE}, event_place = {G{\"o}ttingen, Germany}, event_name = {International Conference on Networked Systems (NetSys 2017)}, DOI = {10.1109/NetSys.2017.7931496}, reviewed = {1}, author = {Ansari, Junaid and Aktas, Ismet and Brecher, Christian and Pallasch, Christoph and Hoffmann, Nicolai and Obdenbusch, Markus and Serror, Martin and Wehrle, Klaus and Gross, James} } @Inproceedings { 2017-matzutt-mynedata, title = {myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data}, year = {2017}, pages = {1073-1084}, abstract = {Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.}, note = {Presentation slides are in German}, keywords = {Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling}, tags = {mynedata_show}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf}, web_url = {https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf}, web_url_date = {Presentation slides}, editor = {Eibl, Maximilian and Gaedke, Martin}, publisher = {Gesellschaft f{\"u}r Informatik, Bonn}, booktitle = {INFORMATIK 2017}, event_place = {Chemnitz}, event_name = {INFORMATIK 2017}, event_date = {2017-09-28}, language = {English}, ISBN = {978-3-88579-669-5}, ISSN = {1617-5468}, DOI = {10.18420/in2017_109}, reviewed = {1}, author = {Matzutt, Roman and M{\"u}llmann, Dirk and Zeissig, Eva-Maria and Horst, Christiane and Kasugai, Kai and Lidynia, Sean and Wieninger, Simon and Ziegeldorf, Jan Henrik and Gudergan, Gerhard and Spiecker gen. D{\"o}hmann, Indra and Wehrle, Klaus and Ziefle, Martina} } @Inproceedings { DombrowskiSRDS16, title = {Model-Checking Assisted Protocol Design for Ultra-reliable Low-Latency Wireless Networks}, year = {2016}, month = {9}, day = {27}, pages = {307--316}, keywords = {fault tolerance;formal verification;protocols;wireless channels;EchoRing protocol;fault-tolerant methods;formal model-based verification;model-checking assisted protocol;probabilistic model checking;reliability constraints;safety-critical industrial applications;salient features;token loss;token-based system;ultrareliable low-latency wireless networks;unprecedented latency;wireless networking community;wireless protocols;wireless token-passing systems;Automata;Model checking;Payloads;Probabilistic logic;Protocols;Reliability;Wireless communication;Model checking;Probabilistic timed automata;Token passing;Wireless Industrial Networks;tool-assisted protocol design;validation}, tags = {cps,hodrian}, web_url = {http://ieeexplore.ieee.org/document/7794360/}, booktitle = {Proc. of IEEE 35th Symposium on Reliable Distributed Systems}, organization = {IEEE}, event_place = {Budapest, Hungary}, event_name = {IEEE 35th Symposium on Reliable Distributed Systems (SRDS)}, DOI = {10.1109/SRDS.2016.048}, reviewed = {1}, author = {Dombrowski, Christian and Junges, Sebastian and Katoen, Joost-Pieter and Gross, James} } @Conference { 2016-hohlfeld-qcman, title = {Insensitivity to Network Delay: Minecraft Gaming Experience of Casual Gamers}, year = {2016}, month = {9}, abstract = {Assessing the impact of network delay on perceived quality of gaming has been subject to many studies involving different genres ranging from fast-paced first-person shooters to strategy games. This paper assesses the impact of network latency on the Quality of Experience (QoE) of casual gamers playing Minecraft. It is based on a user study involving 12 casual gamers with no prior experience with Minecraft. QoE is assessed using the Game Experience Questionnaire (GEQ) and dedicated questions for the overall perceived quality and experienced gameplay interruptions. The main finding is that casual Minecraft players are rather insensitive to network delay of up to 1 sec.}, url = {https://i-teletraffic.org/_Resources/Persistent/bc99ba4324ebc7cf1369f09a6caa334c0203943f/Hohlfeld2016.pdf}, web_url = {http://ieeexplore.ieee.org/abstract/document/7810715/?reload=true}, booktitle = {IEEE QCMan}, event_name = {IEEE QCMan}, DOI = {10.1109/ITC-28.2016.313}, author = {Hohlfeld, Oliver and Fiedler, Hannes and Pujol, Enric and Guse, Dennis} } @Inproceedings { 2016-serror-wowmom-arq, title = {Performance Analysis of Cooperative ARQ Systems for Wireless Industrial Networks}, year = {2016}, month = {6}, day = {21}, tags = {koi}, publisher = {IEEE}, howpublished = {online}, booktitle = {17th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2016), Coimbra, Portugal}, event_place = {Coimbra, Portugal}, language = {en}, DOI = {10.1109/WoWMoM.2016.7523534}, reviewed = {1}, author = {Serror, Martin and Hu, Yulin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Article { 2016-kunz-tomacs-horizon, title = {Parallel Expanded Event Simulation of Tightly Coupled Systems}, journal = {ACM Transactions on Modeling and Computer Simulation (TOMACS)}, year = {2016}, month = {1}, volume = {26}, number = {2}, pages = {12:1--12:26}, abstract = {The technical evolution of wireless communication technology and the need for accurately modeling these increasingly complex systems causes a steady growth in the complexity of simulation models. At the same time, multi-core systems have become the de facto standard hardware platform. Unfortunately, wireless systems pose a particular challenge for parallel execution due to a tight coupling of network entities in space and time. Moreover, model developers are often domain experts with no in-depth understanding of parallel and distributed simulation. In combination, both aspects severely limit the performance and the efficiency of existing parallelization techniques. We address these challenges by presenting parallel expanded event simulation, a novel modeling paradigm that extends discrete events with durations which span a period in simulated time. The resulting expanded events form the basis for a conservative synchronization scheme that considers overlapping expanded events eligible for parallel processing. We furthermore put these concepts into practice by implementing Horizon, a parallel expanded event simulation framework specifically tailored to the characteristics of multi-core systems. Our evaluation shows that Horizon achieves considerable speedups in synthetic as well as real-world simulation models and considerably outperforms the current state-of-the-art in distributed simulation.}, keywords = {Parallel discrete event simulation, Multi-core Systems, Wireless Systems, Simulation Modeling Paradigm, Conservative Synchronization}, tags = {horizon}, publisher = {ACM}, language = {en}, DOI = {10.1145/2832909}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Landsiedel, Olaf and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-serror-channel-coding, title = {Channel Coding Versus Cooperative ARQ: Reducing Outage Probability in Ultra-Low Latency Wireless Communications}, year = {2015}, month = {12}, tags = {koi}, url = {file:1704}, publisher = {IEEE}, howpublished = {online}, booktitle = {IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications (GC'15 - ULTRA2), San Diego, USA}, event_place = {San Diego, USA}, event_name = {IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications}, event_date = {December 6-10 2015}, DOI = {10.1109/GLOCOMW.2015.7414150}, reviewed = {1}, author = {Serror, Martin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-stoffers-mswim-data-deps, title = {Data Dependency based Parallel Simulation of Wireless Networks}, year = {2015}, month = {11}, day = {2}, pages = {291-300}, abstract = {Simulation of wireless systems is highly complex and can only be efficient if the simulation is executed in parallel. To this end, independent events have to be identified to enable their simultaneous execution. Hence, the number of events identified as independent needs to be maximized in order to increase the level of parallelism. Traditionally, dependencies are determined only by time and location of events: If two events take place on the same simulation entity, they must be simulated in timestamp order. Our approach to overcome this limitation is to also investigate data-dependencies between events. This enables event reordering and parallelization even for events at the same simulation entity. To this end, we design the simulation language PSimLa, which aids this process. In this paper, we discuss the PSimLa design and compiler as well as our data-dependency analysis approach in detail and present case studies of wireless network models, speeded up by a factor of 10 on 12 cores where time-based parallelization only achieves a 1.6x speedup.}, note = {Best Paper Award}, keywords = {Parallel simulation; Static code analysis; Data dependencies}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-mswim-data-deps.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Canc{\'u}n, Mexico (MSWiM'15)}, event_place = {Canc{\'u}n, Mexico}, language = {en}, DOI = {10.1145/2811587.2811593}, reviewed = {1}, author = {Stoffers, Mirko and Sehy, Torsten and Gross, James and Wehrle, Klaus} } @Poster { serror-zdn-2015, title = {How to Benefit from Cooperation in Latency-Constrained Wireless Communications}, year = {2015}, month = {9}, day = {25}, tags = {cps,koi,hodrian}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-serror-zdn-cooperation.pdf}, web_url = {http://kn.inf.uni-tuebingen.de/itg-zdn-2015-poster-session}, publisher = {VDE}, howpublished = {online}, organization = {ITG-Fachtagung ''Zukunft der Netze 2015'' – Poster Session, T{\"u}bingen, Germany}, event_place = {T{\"u}bingen, Germany}, author = {Serror, Martin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-gerdes-authorization, title = {Autorisierungsmanagement f{\"u}r das Internet of Things}, year = {2015}, month = {9}, tags = {iotsec}, misc2 = {Online}, booktitle = {D•A•CH Security 2015}, event_place = {Sankt Augustin, Germany}, event_name = {D•A•CH Security 2015}, event_date = {08.09. - 09.09.2015}, state = {accepted}, language = {de}, reviewed = {1}, author = {Gerdes, Stefanie and Hummen, Ren{\'e} and Bergmann, Olaf} } @Inproceedings { 2015-schmidt-santa, title = {Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]}, year = {2015}, month = {8}, day = {19}, tags = {ssiclops}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom}, event_place = {London, United Kingdom}, event_name = {43rd ACM SIGCOMM Conference (SIGCOMM '15)}, event_date = {17–21 August, 2015}, language = {en}, DOI = {10.1145/2785956.2790014}, reviewed = {1}, author = {Schmidt, Florian and Hohlfeld, Oliver and Glebke, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2015-wowmom-schumacher-warpsim, title = {WARPsim: A Code-Transparent Network Simulator for WARP Devices}, year = {2015}, month = {6}, day = {14}, tags = {cps,koi}, url = {file:1688}, publisher = {IEEE}, howpublished = {online}, booktitle = {16th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks: Demos (IEEE WoWMoM 2015 - Demos), Boston, USA}, event_place = {Boston, USA}, event_name = {IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks}, event_date = {14.-17. June 2015}, DOI = {10.1109/WoWMoM.2015.7158181}, reviewed = {1}, author = {Schumacher, Andreas and Serror, Martin and Dombrowski, Christian and Gross, James} } @Inproceedings { 2015-stoffers-pads-data-deps, title = {Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation}, year = {2015}, month = {6}, day = {10}, pages = {73-74}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-pads-data-deps.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom}, event_place = {London, United Kingdom}, language = {en}, DOI = {10.1145/2769458.2769487}, reviewed = {1}, author = {Stoffers, Mirko and Sehy, Torsten and Gross, James and Wehrle, Klaus} } @Inproceedings { Dombrowski2015EW, title = {EchoRing: A Low-Latency, Reliable Token-Passing MAC Protocol for Wireless Industrial Networks}, year = {2015}, month = {5}, day = {20}, abstract = {Spurred by recent industrial trends, such as factory automation or phase synchronization in the smart grid, there is a significant interest for wireless industrial networks lately. In contrast to traditional applications, the focus is on carrying out communication at very short latencies together with high reliabilities. Meeting such extreme requirements with wireless networks is challenging. A potential candidate for such a network is a token-passing protocol, as it allows to bound latencies. However, it lacks mechanisms to cope with the dynamics of wireless channels. In this paper, we present EchoRing, a novel wireless token-passing protocol. Cooperative communication and an improved fault tolerance allow this decentralized protocol to support industrial applications over wireless networks. Based on experimental results, we demonstrate the suitability of EchoRing to support demands of industrial applications. EchoRing outperforms other schemes by several orders of magnitude in terms of reliability for latencies of and below 10ms.}, keywords = {Protocols and architectures for wireless networks; Testbeds and experimental wireless systems; Reliability: robust and dependable wireless systems}, tags = {cps,hodrian}, publisher = {IEEE}, booktitle = {Proc. of 21st European Wireless Conference (EW15)}, event_place = {Budapest, Hungary}, event_name = {European Wireless Conference (EW)}, event_date = {20/05/2015}, ISBN = {978-3-8007-3976-9}, author = {Dombrowski, Christian and Gross, James} } @Inproceedings { virtualcoordinate_li_lin_stoffers_gross_2015, title = {Channel-Aware Virtual Coordinates Assignment Protocol and Routing in Multi-Hop Cognitive Radio Network}, year = {2015}, month = {5}, day = {20}, url = {http://dl.ifip.org/db/conf/networking/networking2015/1570067591.pdf}, misc2 = {Online}, publisher = {IFIP}, address = {Laxenburg, Austria}, booktitle = {Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France}, event_place = {Toulouse, France}, language = {en}, DOI = {10.1109/IFIPNetworking.2015.7145337}, reviewed = {1}, author = {Li, Di and Lin, Zhichao and Stoffers, Mirko and Gross, James} } @Inproceedings { Dombrowski2015NetSys, title = {EchoRing: Meeting Hard Real-Time Constraints with Decentralized Wireless Networks}, year = {2015}, month = {3}, day = {9}, pages = {1--3}, tags = {cps,hodrian}, url = {http://www.netsys2015.com/wp-content/uploads/NetSys2015_Demo_Dombrowski.pdf}, web_url = {http://www.netsys2015.com/program/demonstrations/}, web_url2 = {http://www.netsys2015.com/communication-software-awards/}, misc = {2nd Place Regular Demonstrations}, publisher = {IEEE}, booktitle = {Proc. of 2nd International Conference on Networked Systems, Demonstrations (NetSys15)}, event_place = {Cottbus, Germany}, event_name = {Conference on Networked Systems (NetSys) - Demo Session}, event_date = {09/03/2015}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Inproceedings { 2014-ziegeldorf-codaspy-coinparty, title = {CoinParty: Secure Multi-Party Mixing of Bitcoins}, year = {2015}, month = {3}, day = {2}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA}, event_place = {San Antonio, TX, USA}, event_name = {The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015)}, language = {en}, ISBN = {978-1-4503-3191-3}, DOI = {10.1145/2699026.2699100}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Grossmann, Fred and Henze, Martin and Inden, Nicolas and Wehrle, Klaus} } @Conference { Schumacher2014, title = {A Code-transparent MAC Simulator for WARP}, year = {2014}, month = {11}, day = {19}, tags = {hodrian,cps}, booktitle = {Proc. of European workshop on testbed based wireless research}, event_place = {Stockholm, Sweden}, event_name = {European workshop on testbed based wireless research}, event_date = {19/11/2014}, author = {Schumacher, Andreas and Dombrowski, Christian and Gross, James} } @Conference { parruca_2014ICIC, title = {Semi-Static Interference Coordination in OFDMA/LTE Networks: Evaluation of Practical Aspects}, year = {2014}, month = {9}, day = {21}, abstract = {To minimize interference in LTE networks, several inter-cell interference coordination (ICIC) techniques have been in- troduced. Among them, semi-static ICIC offers a balanced trade-off between applicability and system performance. The power allocation per resource block and cell is adapted in the range of seconds according to the load in the system. An open issue in the literature is the question how fast the adaptation should be performed. This leads basically to a trade-off between system performance and feasible compu- tation times of the associated power allocation problems. In this work, we close this open issue by studying the impact that different durations of update times of semi-static ICIC have on the system performance. We conduct our study on realistic scenarios considering also the mobility of mobile terminals. Secondly, we also consider the implementation aspects of a semi-static ICIC. We introduce a very efficient implementation on general purpose graphic processing units, harnessing the parallel computing capability of such devices. We show that the update periods have a significant impact on the performance of cell edge terminals. Additionally, we present a graphic processing unit (GPU) based implementation which speeds up existing implementations up to a factor of 92x.}, keywords = {OFDMA; LTE; ICIC; Inter-Cell Interference Coordination; GPU; GA; Genetic Algorithm; 4G; Cellular Networks; In- terference; Proportional Fair Scheduling}, editor = {ACM}, publisher = {ACM}, booktitle = {Proceedings of the 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM-14)}, event_place = {Montreal, QC, Canada}, event_name = {International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM-14)}, event_date = {September 21-26 2014}, DOI = {http://dx.doi.org/10.1145/2641798.2641818}, reviewed = {1}, author = {Parruca, Donald and Aizaz, Fahad and Chantaraskul, Soamsiri and Gross, James} } @Inproceedings { 2014-stoffers-omnet-parallel-inet, title = {Enabling Distributed Simulation of OMNeT++ INET Models}, year = {2014}, month = {9}, day = {3}, url = {http://arxiv.org/pdf/1409.0994}, misc = {arXiv:1409.0994}, misc2 = {Online}, publisher = {Cornell University}, address = {Ithaca, New York, United States}, booktitle = {Proceedings of the 1st OMNeT++ Community Summit, Hamburg, Germany}, event_place = {Hamburg, Germany}, language = {en}, author = {Stoffers, Mirko and Bettermann, Ralf and Gross, James and Wehrle, Klaus} } @Inproceedings { 2014-wowmom-wirtz-sofi, title = {Pervasive Content-centric Wireless Networking}, year = {2014}, month = {6}, day = {18}, url = {fileadmin/papers/2014/2014-wirtz-wowmom-sofi.pdf}, misc = {online}, publisher = {IEEE}, booktitle = {15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {WoWMoM}, event_date = {June, 2014}, language = {en}, DOI = {10.1109/WoWMoM.2014.6918968}, reviewed = {1}, author = {Wirtz, Hanno and Ceriotti, Matteo and Grap, Benjamin and Wehrle, Klaus} } @Inproceedings { 2014-aktas-punal-wowmom-machine-learning-based-jamming-detection-for-80211-conference, title = {Machine Learning-based Jamming Detection for IEEE 802.11: Design and Experimental Evaluation}, journal = {Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia}, year = {2014}, month = {6}, day = {16}, pages = {1--10}, tags = {crawler}, url = {fileadmin/papers/2014/2014-aktas-wowmom-jammingdetection.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia}, event_place = {Sydney}, event_name = {15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14)}, event_date = {16-19 June, 2014}, language = {en}, reviewed = {1}, author = {Pu{\~n}al, Oscar and Aktas, Ismet and Schnelke, Caj-Julian and Abidin, Gloria and Gross, James and Wehrle, Klaus} } @Article { parruca2014icc, title = {On the Interference As Noise Approximation in OFDMA/LTE Networks}, journal = {Proceedings of IEEE International Conference on Communications (ICC 2014)}, year = {2014}, month = {6}, day = {11}, url = {fileadmin/papers/2014/2014_parruca_gross.pdf}, misc2 = {Online}, language = {en}, reviewed = {1}, author = {Parruca, Donald and Gross, James} } @Inproceedings { 2014-stoffers-simutools-distributed-horizon, title = {Large-Scale Network Simulation: Leveraging the Strengths of Modern SMP-based Compute Clusters}, year = {2014}, month = {3}, day = {17}, pages = {31-40}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-stoffers-simutools-distributed-horizon.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SIMUTools'14), Lisbon, Portugal}, event_place = {Lisbon, Portugal}, language = {en}, ISBN = {978-1-63190-007-5}, DOI = {10.4108/icst.simutools.2014.254622}, reviewed = {1}, author = {Stoffers, Mirko and Schmerling, Sascha and Kunz, Georg and Gross, James and Wehrle, Klaus} } @Inproceedings { 2013-cloudcom-henze-cloud-data-handling, title = {Towards Data Handling Requirements-aware Cloud Computing (Poster Abstract)}, year = {2013}, month = {12}, day = {2}, pages = {266-269}, tags = {ipacs}, url = {fileadmin/papers/2013/2013-cloudcom-henze-cloud-data-handling.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK}, event_place = {Bristol, UK}, event_name = {2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013)}, language = {en}, ISBN = {978-0-7695-5095-4}, DOI = {10.1109/CloudCom.2013.145}, reviewed = {1}, author = {Henze, Martin and Gro{\ss}fengels, Marcel and Koprowski, Maik and Wehrle, Klaus} } @Techreport { 2013-draft-hummen-dtls-extended-session-resumption-01, title = {Extended DTLS Session Resumption for Constrained Network Environments}, year = {2013}, month = {10}, day = {18}, number = {draft-hummen-dtls-extended-session-resumption-01}, abstract = {This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Hummen, Ren{\'e} and Gilger, Johannes and Shafagh, Hossein} } @Techreport { 2013-draft-garcia-core-security-06, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {9}, day = {11}, number = {draft-garcia-core-security-06}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-06}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Conference { VTC2013_parruca_gross, title = {Analytical Model of Proportional Fair Scheduling in Interference-limited OFDMA/LTE Networks}, year = {2013}, month = {9}, abstract = {Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_VTC_parruca.pdf}, booktitle = {Proceedings of IEE Vehicular Telecommunications Conference (VTC-Fall 2013)}, event_place = {Las Vegas, USA}, event_name = {2013 IEEE 78th Vehicular Technology Conference}, event_date = {2-5, September, 2013}, author = {Parruca, Donald and Grysla, Marius and G{\"o}rtzen, Simon and Gross, James} } @Techreport { draft-hummen-dtls-extended-session-resumption-00, title = {Extended DTLS Session Resumption for Constrained Network Environments}, year = {2013}, month = {7}, day = {15}, number = {draft-hummen-dtls-extended-session-resumption-00}, abstract = {This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Hummen, Ren{\'e} and Gilger, Johannes} } @Article { 2013-scn-ziegeldorf-iot-privacy, title = {Privacy in the Internet of Things: Threats and Challenges}, journal = {Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World'}, year = {2013}, month = {6}, day = {10}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-ziegeldorf-scn-privacy-in-the-iot.pdf}, misc2 = {Online}, publisher = {Wiley}, language = {en}, DOI = {10.1002/sec.795}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Garcia-Morchon, Oscar and Wehrle, Klaus} } @Conference { 2013-wowmom-punal-RFRA, title = {RFRA: Random Forests Rate Adaptation for Vehicular Networks}, year = {2013}, month = {6}, day = {4}, publisher = {IEEE}, booktitle = {Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)}, event_place = {Madrid, Spain}, event_name = {WoWMoM}, event_date = {June, 2013}, state = {accepted}, author = {Pu{\~n}al, Oscar and Zhang, Hanzhi and Gross, James} } @Inproceedings { Dombrowski2013WiOpt, title = {Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications}, year = {2013}, month = {5}, day = {13}, pages = {341-348}, keywords = {energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi}, booktitle = {11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013)}, event_place = {Tsukuba Science City, Japan}, language = {English}, reviewed = {1}, author = {Dombrowski, Christian and Petreska, Neda and G{\"o}rtzen, Simon and Schmeink, Anke and Gross, James} } @Inproceedings { 2013-EW-Weyres-Interference, title = {Effective Service Capacity Analysis of Interference-Limited Multi-Carrier Wireless Systems}, journal = {19th European Wireless Conference}, year = {2013}, month = {4}, pages = {1--7}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6582799}, publisher = {VDE-Verlag}, booktitle = {19th European Wireless Conference (EW 2013)}, ISBN = {978-3-8007-3498-6}, DOI = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6582799}, reviewed = {1}, author = {Weyres, Marco and Gross, James} } @Inproceedings { 2013-wisec-garcia-securing, title = {Securing the IP-based Internet of Things with HIP and DTLS}, year = {2013}, month = {4}, pages = {119--124}, publisher = {ACM}, booktitle = {Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)}, ISBN = {978-1-4503-1998-0}, DOI = {10.1145/2462096.2462117}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Moreno-Sanchez, Pedro and Vidal-Meca, Francisco and Ziegeldorf, Jan Henrik} } @Inproceedings { 2013-pitsac-vidalmeca-hip, title = {HIP security architecture for the IP-based Internet of Things}, year = {2013}, month = {3}, day = {25}, pages = {1331 - 1336}, abstract = {The IP-based Internet of Things refers to the pervasive interactions of smart objects and people enabling new applications by means of IP protocols. An application scenario is a Smart City in which the city infrastructure, cars, and people exchange information to enable new services. IP protocols, such as IPv6, TCP and HTTP will be further complemented by IPv6 over Low powerWireless Personal Area Networks and Constrained Application Protocol currently in development in IETF. Security and privacy are a must for the IP-based IoTs in order to ensure its acceptance. However, mobility, limited bandwidth, and resource-constrained devices pose new challenges and require for a sound and efficient security architecture. In particular, dynamic association of mobile smart objects and the management of keys in large-scale networks remain an open challenge. In this context, we propose a flexible security architecture based on the Host Identity Protocol and Multimedia Internet KEYing protocols allowing for secure network association and key management. HIP - based on asymmetric-key cryptography - ensures unambiguous thing identification, mobility support, as well as a lightweight and secure method for network association. In our solution, HIP is extended with MIKEY capabilities to provide enhanced key management using polynomials, which allow to generate pairwise keys with any node based on its identity. This combination of protocols and crypto-algorithms ensures both strong security and very good performance as shown by our implementation and presents clear advantages compared with other alternatives.}, keywords = {Internet of Things; Security; Network Access; Key Management}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013}, event_place = {Barcelona, Spain}, event_date = {25.-28.03.2013}, language = {en}, DOI = {10.1109/WAINA.2013.158}, reviewed = {1}, author = {Vidal Meca, Francisco and Ziegeldorf, Jan Henrik and Garcia-Morchon, Oscar and Kumar, Sandeep S. and Keoh, Sye Loong and Moreno-Sanchez, Pedro} } @Techreport { 2013-draft-garcia-core-security-05, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {3}, day = {11}, number = {draft-garcia-core-security-05}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-05}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Proceedings { parruca_gross_2013, title = {Rate selection analysis under semi-persistent scheduling in LTE networks}, year = {2013}, month = {1}, day = {25}, pages = {1184,1190}, abstract = {Upcoming LTE networks have basically two different modes for scheduling data in the down-link by the base station. Dynamic scheduling brings the advantage of exploiting instantaneous channel state information while it puts on the other hand a significant burden on the system in terms of overhead and computation requirements. Especially for small packets that show up periodically, the overhead is typically too high. Therefore, the base station can serve such packet flows by the semi-persistent scheduling mode. In this mode, a certain resource allocation is fixed to a periodic schedule. While this does not allow any longer to exploit instantaneous channel states, it requires much less overhead. In this paper, we address the problem of selecting a modulation and coding scheme for such semi-persistent scheduling grants. The problem lies here in the stochastic characterization of the resource blocks over the next few seconds while on the other hand estimating based on such a characterization the blok error rate (and hence the average goodput). We provide a novel scheme, which outperforms all previously presented schemes significantly. The underlying model that we provide can also be used for any other long-term decision in an LTE system with semi-persistent scheduling such as interference coordination, handover decision etc.}, keywords = {Long Term Evolution;decision making;dynamic scheduling;error statistics;modulation;radio links;resource allocation;stochastic processes;wireless channels;LTE networks;base station;blok error rate;data scheduling;down-link;dynamic scheduling;instantaneous channel state information;long-term decision;modulation selection;packet flows;periodic scheduling;rate selection analysis;resource allocation;resource blocks;semi-persistent scheduling mode;stochastic characterization}, url = {www.performance.rwth-aachen.de/publications/conferences/2013ICNC_parruca.pdf}, web_url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6504261}, event_place = {San Diego, USA}, event_name = {International Conference on Computing, Networking and Communications (ICNC) 2013}, event_date = {28-31 January 2013}, language = {English}, ISBN = {978-1-4673-5287-1}, DOI = {10.1109/ICCNC.2013.6504261}, author = {Parruca, Donald and Gross, James} } @Inbook { 2013-book-weingaertner-benchmarking-p2p, title = {Benchmarking Peer-to-Peer Systems Understanding Quality of Service in Large-Scale Distributed Systems}, year = {2013}, volume = {7847}, pages = {69-79}, web_url = {http://link.springer.com/chapter/10.1007/978-3-642-38673-2_5}, web_url_date = {2016-11-11}, misc2 = {Print}, editor = {Effelsberg, Wolfgang and Steinmetz, Ralf and Strufe, Thorsten}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, chapter = {Content Delivery Overlays}, language = {EN}, ISBN = {978-3-642-38672-5}, DOI = {10.1007/978-3-642-38673-2_5}, author = {Weingaertner, Elias and Glebke, Ren{\'e} and Hocks, Alexander} } @Conference { EW2013_parruca_gross, title = {On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems}, year = {2013}, pages = {8}, abstract = {In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models.}, keywords = {ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf}, web_url = {http://www.vde-verlag.de/proceedings-en/563498043.html}, editor = {vde-verlag}, publisher = {vde-verlag}, address = {http://www.vde-verlag.de/}, booktitle = {Proceedings: European Wireless 2013}, event_place = {Guildford, UK}, event_name = {2013 - 19th European Wireless Conference}, event_date = {04/16/2012 - 04/18/2013}, language = {English}, author = {Parruca, Donald and Grysla, Marius and M{\"a}h{\"o}nen, Petri and Petrova, Marina and Zhou, Han and Naghibi, Farshad and Gross, James} } @Inproceedings { 2013_Jakobs_SIIT1, title = {How to Perceive the (Future) Role of China in ICT Standardisation – A European Perspective. Proc. 8th Int. Conf. on Standardisation \& Innovation in Information Technology}, year = {2013}, url = {fileadmin/papers/2013/2013_Jakobs_SIIT1.pdf}, booktitle = {Proc. 8th Int. Conf. on Standardisation \& Innovation in Information Technology}, reviewed = {1}, author = {Jakobs, Kai and Gerst, Martina} } @Inproceedings { 2012-IPIN-Bitsch-FlowPath, title = {Indoor Navigation on Wheels (and on Foot) using Smartphones}, year = {2012}, month = {11}, day = {13}, pages = {10 S.}, url = {fileadmin/papers/2012/2012-bitsch-IPIN-navigation-on-wheels.pdf}, web_url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6418931}, misc2 = {Print}, address = {Piscataway, NJ, USA}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 11-13 November 2012 Sydney, Australia}, organization = {IEEE}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-1-4673-1955-3}, DOI = {10.1109/IPIN.2012.6418931}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Gerdsmeier, Felix and Smith, Paul and Wehrle, Klaus} } @Inproceedings { 2012-Q2SWinet-Gross-Noise, title = {Effective Service Capacity Analysis of Opportunistic Multi-Carrier OFDMA Systems}, year = {2012}, month = {10}, pages = {17--26}, publisher = {ACM}, booktitle = {Proc. of the ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2012)}, language = {en}, ISBN = {978-1-4503-1619-4}, DOI = {10.1145/2387218.2387222}, reviewed = {1}, author = {Gross, James and Weyres, Marco and Wolisz, Adam} } @Inproceedings { 2012-pimrc-schmidt-ofra, title = {A Receiver-Based 802.11 Rate Adaptation Scheme with On-Demand Feedback}, year = {2012}, month = {9}, day = {10}, pages = {1--7}, abstract = {Classical 802.11 rate adaptation algorithms rely on feedback from the receiver to correctly choose a sending rate, typically in the form of acknowledgments (ACKs). In the absence of such frames, novel techniques are required for rate selection. We present OFRA, a receiver-based rate adaptation algorithm that works with ACK-less traffic. Feedback information is sent on-demand using a control frame to explicitly inform the transmitter about which bit rate to use on subsequent data frames. This approach guarantees standard conformity and exhibits fast and accurate bit rate adaptation at the cost of a modest overhead increase. We evaluate the performance of OFRA against various state-of-the-art rate adaptation schemes by means of simulations. If ACK frames are to be transmitted, OFRA performs better than related work in most considered scenarios, and on par in the others. In the absence of ACKs, OFRA provides large goodput gains under good channel conditions and comparable goodput in other situations.}, tags = {OFRA refector}, url = {fileadmin/papers/2012/2012-schmidt-pimrc-ofra.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12)}, event_date = {9-12 September 2012}, language = {en}, ISBN = {978-1-4673-2566-0}, ISSN = {2166-9570}, DOI = {10.1109/PIMRC.2012.6362818}, reviewed = {1}, author = {Schmidt, Florian and Hithnawi, Anwar and Pu{\~n}al, Oscar and Gross, James and Wehrle, Klaus} } @Inproceedings { 2012-mobicom-wirtz-sofi, title = {Demo: On-demand Content-centric Wireless Networking}, year = {2012}, month = {8}, pages = {451-454}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 18th ACM Annual International Conference on Mobile Computing and Networking (MobiCom'12), Istanbul, Turkey}, event_place = {Istanbul, Turkey}, event_name = {18th ACM Annual International Conference on Mobile Computing and Networking}, event_date = {22-26 August 2012}, language = {en}, ISBN = {978-1-4503-1159-5}, DOI = {10.1145/2348543.2348608}, reviewed = {1}, author = {Wirtz, Hanno and Martin, David and Grap, Benjamin and Wehrle, Klaus} } @Inproceedings { 2012-kunz-pads-gpu, title = {Multi-level Parallelism for Time- and Cost-efficient Parallel Discrete Event Simulation on GPUs}, year = {2012}, month = {7}, day = {20}, pages = {23--32}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-pads-gpu.pdf}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China}, language = {en}, ISBN = {978-0-7695-4714-5}, ISSN = {1087-4097}, DOI = {10.1109/PADS.2012.27}, reviewed = {1}, author = {Kunz, Georg and Schemmel, Daniel and Gross, James and Wehrle, Klaus} } @Inproceedings { 2012-AIS-Gerst-vehicles, title = {Electric Vehicles and Standardization Management – The Case of a Sino-German Cooperation}, year = {2012}, month = {6}, day = {8}, booktitle = {Proc. of the Annual Conference of the Academy of Innovation and Entrepreneurship (AIS).}, author = {Gerst, Martina and Jakobs, Kai and Xudong, Gao} } @Inproceedings { 2012-EURAS-Gerst-Mobility, title = {Standardisation Management in Electric Mobility}, year = {2012}, month = {6}, url = {fileadmin/papers/2012/2012-EURAS-Gerst-Mobility.pdf}, misc2 = {Print}, editor = {Marta Orviska; Kai Jakobs}, publisher = {Mainz}, booktitle = {17th EURAS Aannual Conference, 2012, Kosice, Slowakia}, language = {EN}, ISBN = {978-3-86130-337-4}, reviewed = {1}, author = {Gerst, Martina and Jakobs, Kai} } @Conference { 2012-wns3-weingaertner-glebke-vodsim, title = {Building a modular BitTorrent model for ns-3}, year = {2012}, month = {3}, day = {26}, pages = {373-344}, abstract = {Over the past decade BitTorrent has established itself as the virtual standard for P2P file sharing in the Internet. However, it is currently not possible to investigate BitTorrent with ns-3 due to the unavailability of an according application model. In this paper we eliminate this burden. We present a highly modular BitTorrent model which allows for the easy simulation of different BitTorrent systems such as file sharing as well as present and future BitTorrent-based Video-on-Demand systems.}, note = {Best Paper Award, Best Student Paper Award}, web_url = {http://dl.acm.org/citation.cfm?id=2263019.2263073}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 2012 workshop on ns-3 (WNS3 2012), 26 March 2012, Desenzano del Garda, Italy}, event_place = {Desenzano del Garda, Italy}, event_name = {Proceedings of the 2012 workshop on ns-3 (WNS3 2012)}, ISBN = {978-1-4503-1510-4}, reviewed = {1}, author = {Weingaertner, Elias and Glebke, Ren{\'e} and Lang, Martin and Wehrle, Klaus} } @Techreport { 2012-draft-garcia-core-security, title = {Security Considerations in the IP-based Internet of Things}, year = {2012}, month = {3}, day = {26}, number = {draft-garcia-core-security-04}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Poster { 2012-kunz-omnetpp-sequencechart, title = {Poster Abstract: Extending the OMNeT++ Sequence Chart for Supporting Parallel Simulations in Horizon}, year = {2012}, month = {3}, day = {23}, affiliation = {5th International Workshop on OMNeT++ (OMNeT++'12), Desenzano del Garda, Italy}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-omnetpp-sequencechart.pdf}, misc2 = {Online}, publisher = {ICST}, event_name = {5th International Workshop on OMNeT++ (OMNeT++'12), Desezano del Garda, Italy}, language = {en}, reviewed = {1}, author = {Kunz, Georg and Tenbusch, Simon and Gross, James and Wehrle, Klaus} } @Inproceedings { 2012-kunz-simutools-probabilistic-sync, title = {Know Thy Simulation Model: Analyzing Event Interactions for Probabilistic Synchronization in Parallel Simulations}, year = {2012}, month = {3}, day = {20}, pages = {119-128}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-simutools-prob-synch.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques (SIMUTools'12), Desenzano del Garda, Italy}, event_place = {Desenzano, Italy}, language = {en}, ISBN = {978-1-4503-1510-4}, DOI = {10.4108/icst.simutools.2012.247716}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Inproceedings { 2012-extremecom-goliath-adama, title = {A Versatile Architecture for DTN Services (Demo)}, year = {2012}, month = {3}, day = {10}, pages = {1--2}, abstract = {In this demo we present our architecture for delivering ap- plication services via Disruption or Delay Tolerant Networks (DTNs). The search for a killer application is still ongoing. Our architecture enables the community to quickly proto- type new services and test them in the real world, outside of simulators. Common tasks such as data transportation through the network is handled by the framework but can still be in uenced by the service, if required. A robust plu- gin architecture allows to deploy new applications and rout- ing schemes without a ecting stable-running services on the same network, even if the source of the new plugin is un- trusted.}, annotation = {Demo Abstract}, web_url = {http://extremecom2012.ee.ethz.ch/papers/7-extremecom2012-Goliath.pdf}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ETH Zurich}, address = {Zurich, Switzerland}, booktitle = {Proceedings of the 4th Extreme Conference on Communication}, event_place = {Zurich Switzerland}, event_name = {4th Extreme Conference on Communication}, event_date = {March 10-14, 2012}, language = {en}, reviewed = {1}, author = {Goliath, Andr{\'e} and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { Punal12_Jamming, title = {{In VANETs We Trust?: Characterizing RF Jamming in Vehicular Networks}}, year = {2012}, pages = {83--92}, publisher = {ACM}, booktitle = {Proc. of the 9th ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications (VANET'12)}, author = {Pu{\~n}al, Oscar and Aguiar, Ana and Gross, James} } @Inproceedings { Punal12_PowerLoading, title = {{Power Loading: Candidate for Future WLANs?}}, year = {2012}, pages = {1-4}, booktitle = {Proc. of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'12)}, author = {Pu{\~n}al, Oscar and Escudero, Humberto and Gross, James} } @Inproceedings { Li2012DySPAN, title = {{Distributed TV Spectrum Allocation for Cognitive Cellular Network under Game Theoretical Framework}}, year = {2012}, booktitle = {Proc. of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'12)}, author = {Li, Di and Gross, James} } @Phdthesis { 2012-goetz-phdthesis, title = {Supporting Diversity and Evolvability in Communication Protocols}, year = {2012}, school = {RWTH Aachen University}, author = {G{\"o}tz, Stefan} } @Inproceedings { Varj1112:Secure, title = {Secure Resolution of {End-Host} Identifiers for Mobile Clients}, year = {2011}, month = {12}, day = {5}, abstract = {Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT}, keywords = {DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution}, url = {fileadmin/papers/2011/2011-varjonen-secure.pdf}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award}, state = {accepted}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Varjonen, Samu and Heer, Tobias and Rimey, Kenneth and Gurtov, Andrei} } @Techreport { 2011-draft-garcia-core-security-03, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {10}, day = {31}, number = {draft-garcia-core-security-03}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { Dombrowski2011LCN, title = {Hard Real-Time Wireless Medium Access in Action: Stop the Guillotine Within a Millisecond!}, year = {2011}, month = {10}, day = {4}, pages = {1--3}, url = {http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_dombrowski.pdf}, web_url = {http://www.ieeelcn.org/prior/LCN36/lcn36demos.html}, booktitle = {Proc. of Local Computer Networks Conference, Demonstrations, (LCN'11)}, event_place = {Bonn, Germany}, event_name = {36th IEEE Conference on Local Computer Networks (LCN)}, event_date = {04/10/2011}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Article { 2011-heer-iot-journal, title = {Security Challenges in the IP-based Internet of Things}, journal = {Springer Wireless Personal Communications Journal}, year = {2011}, month = {10}, volume = {61}, number = {3}, pages = {527-542}, abstract = {A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.}, tags = {iotsec}, url = {fileadmin/papers/2011/2011-heer-iot-challenges.pdf}, misc2 = {Online}, publisher = {Springer}, address = {Netherlands}, language = {en}, ISSN = {0929-6212}, DOI = {10.1007/s11277-011-0385-5}, reviewed = {1}, author = {Heer, Tobias and Garcia-Morchon, Oscar and Hummen, Ren{\'e} and Keoh, Sye Loong and Kumar, Sandeep S. and Wehrle, Klaus} } @Inproceedings { 2011-wintech-alizai-tinywifi, title = {TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers}, year = {2011}, month = {9}, pages = {19-27}, tags = {tinywifi}, url = {fileadmin/papers/2011/2010-09-tinywifi-alizai-wintech.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH ), Las Vegas, NV, USA}, event_place = {Las Vegas, NV, USA}, event_name = {The 17th Annual International Conference on Mobile Computing and Networking}, event_date = {September 2011}, language = {en}, ISBN = {978-1-4503-0867-0}, DOI = {10.1145/2030718.2030725}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kirchen, Bernhard and Vaegs, Tobias and Gnawali, Omprakash and Wehrle, Klaus} } @Inproceedings { 2011-kunz-mascots-performance-prediction, title = {Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations}, year = {2011}, month = {7}, day = {25}, pages = {359 - 368}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-performance-prediction-mascots.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'11), Singapore}, event_place = {Singapore}, event_name = {19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems}, event_date = {July 25-17, 2011}, language = {en}, ISBN = {978-1-4577-0468-0}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2011.15}, reviewed = {1}, author = {Kunz, Georg and Tenbusch, Simon and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-02, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {7}, day = {11}, number = {draft-garcia-core-security-02}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-02}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-iscc-alizai-ble, title = {Efficient Online Estimation of Bursty Wireless Links}, year = {2011}, month = {6}, url = {fileadmin/papers/2011/2011-alizai-iscc-ble.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {16th IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece}, event_place = {Kerkyra, Greece}, language = {en}, ISBN = {978-1-4577-0678-3}, DOI = {10.1109/ISCC.2011.5983839}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kunz, Georg and Grap, Benjamin and Wehrle, Klaus} } @Inproceedings { Dombrowski2011RealWIN, title = {Reducing Outage Probability Over Wireless Channels Under Hard Real-time Constraints}, year = {2011}, month = {4}, day = {11}, pages = {1 -6}, booktitle = {Proc. of Workshop on Real-Time Wireless For Industrial Applications (RealWIN'11)}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Inproceedings { 2011-ipsn-alizai-pad, title = {Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks}, year = {2011}, month = {4}, url = {fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA}, event_place = {Chicago, IL, USA}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and G{\"o}tz, Stefan and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2011-kunz-omnetpp-horizon, title = {Runtime Efficient Event Scheduling in Multi-threaded Network Simulation}, year = {2011}, month = {3}, day = {21}, pages = {359-366}, abstract = {Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation. We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \textbackslashemph\{push-based event handling scheme\} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \textbackslashemph\{event scheduling algorithm\} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {4th International Workshop on OMNeT++ (OMNeT++'11)}, event_date = {March 21, 2011}, language = {en}, ISBN = {978-1-936968-00-8}, DOI = {10.4108/icst.simutools.2011.245504}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-01, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {14}, number = {draft-garcia-core-security-01}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Techreport { 2011-draft-garcia-core-security-00, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {7}, number = {draft-garcia-core-security-00}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { PunalScOff11, title = {{Combined Subcarrier Switch Off and Power Loading for 80 MHz Bandwidth WLANs}}, year = {2011}, booktitle = {Proc. of the 18th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN'11)}, author = {Pu{\~n}al, Oscar and Gross, James} } @Inproceedings { Punal11, title = {{Performance Comparison of Loading Algorithms for 80 MHz IEEE 802.11 WLANs}}, year = {2011}, pages = {124--132}, booktitle = {Proc. of the 73rd IEEE Vehicular Technology Conference (VTC-Spring'11)}, author = {Pu{\~n}al, Oscar and Escudero, Humberto and Gross, James} } @Inproceedings { Li2011ICC, title = {{Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access}}, year = {2011}, pages = {1 -6}, booktitle = {Proc. of IEEE International Conference on Communications (ICC'11)}, author = {Li, Di and Gross, James} } @Inproceedings { 2010-kunz-mascots-horizon, title = {Expanding the Event Horizon in Parallelized Network Simulations}, year = {2010}, month = {8}, day = {18}, pages = {172-181}, abstract = {The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.}, tags = {horizon}, url = {fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA}, event_place = {Miami, FL, USA}, event_name = {18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)}, event_date = {August 17-19, 2010}, language = {en}, ISBN = {978-0-7695-4197-6}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2010.26}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Gross, James and G{\"o}tz, Stefan and Naghibi, Farshad and Wehrle, Klaus} } @Inproceedings { 2010-heer-pisa-sa, title = {PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing}, year = {2010}, month = {8}, day = {2}, volume = {1}, pages = {588-593}, abstract = {With the goal of providing ubiquitous wireless services (e.g., tourist guides, environmental information, pedestrian navigation), municipal wireless networks are currently being established all around the world. For municipalities, it is often challenging to achieve the bandwidth and coverage that is necessary for many of the envisioned network services. At the same time, Wi-Fi-sharing communities achieve high bandwidth and good coverage at a very low cost by capitalizing on the dense deployment of private access points in urban areas. However, from a technical, conceptual, and security perspective, Wi-Fi sharing community networks resemble a patchwork of heterogeneous networks instead of one well-planned city-wide network. This patchwork character stands in stark contrast to a uniform, secure platform for public and commercial services desirable for the economic success of such a network. Hence, despite its cost-efficiency, the community-based approach cannot be adopted by municipalities easily. In this paper, we show how to realize municipal wireless services on top of a Wi-Fi-sharing infrastructure in a technically sound and economically attractive fashion. In particular, we focus on how to securely provide services to mobile clients with and without client-side software support. Our solution cleanly separates the roles of controlling and administering the network from providing bandwidth and wireless access. With this separation, commercial ISPs and citizens with their private Wi-Fi can contribute to the network infrastructure. This allows municipalities in turn to focus their resources on municipal wireless services.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-icc-pisa-sa.pdf}, misc2 = {Print}, publisher = {IEEE Press}, address = {Washington, DC, USA}, booktitle = {International Conference on Computer Communication Networks, ICCCN 2010, Zurich}, event_place = {Zurich, Switzerland}, event_name = {International Conference on Computer Communication Networks, ICCCN 2010}, language = {en}, ISBN = {978-1-4244-7114-0}, DOI = {10.1109/ICCCN.2010.5560103}, reviewed = {1}, author = {Heer, Tobias and Jansen, Thomas and Hummen, Ren{\'e} and Wirtz, Hanno and G{\"o}tz, Stefan and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { 201004IPSNbitschratmote, title = {Demo Abstract: RatMote - A Sensor Platform for Animal Habitat Monitoring}, year = {2010}, month = {4}, day = {12}, pages = {432--433}, abstract = {In this work, we present RatMote, a new wireless sensor node for subterranean animal habitat monitoring. RatMote has been developed for project RatPack, which aims at creating a new method for behavioral research on rats in their natural environment using wireless sensor nodes. Recent development in microcontroller architecture allowed us to design a sensor node which calculates up to 22 times more operations per mAh than the widely used TelosB node. This significant performance and efficiency increase allows us to perform computationally demanding algorithms inside the node, needed for vocalization analysis, localization, and mapping.}, note = {Demo Abstract}, tags = {RatPack}, url = {fileadmin/papers/2010/2010-04-IPSN-bitsch-ratmote.pdf}, web_url = {http://doi.acm.org/10.1145/1791212.1791291}, misc2 = {Online}, publisher = {ACM}, address = {New York City, NY, USA}, series = {IPSN '10}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, organization = {ACM}, event_place = {Stockholm, Sweden}, event_name = {9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)}, event_date = {April 12-16, 2010}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791291}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Bretgeld, Thomas and Goliath, Andr{\'e} and Wehrle, Klaus} } @Inproceedings { 2010-percomws-heer-munifi, title = {Collaborative Municipal Wi-Fi Networks - Challenges and Opportunities}, journal = {Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), IEEE.}, year = {2010}, month = {4}, day = {2}, volume = {1}, pages = {588 - 593}, abstract = {Municipal Wi-Fi networks aim at providing Internet access and selected mobile network services to citizens, travelers, and civil servants. The goals of these networks are to bridge the digital divide, stimulate innovation, support economic growth, and increase city operations efficiency. While establishing such urban networks is financially challenging for municipalities, Wi-Fi-sharing communities accomplish good coverage and ubiquitous Internet access by capitalizing on the dense deployment of private access points in urban residential areas. By combining Wi-Fi communities and municipal Wi-Fi, a collaborative municipal Wi-Fi system promises cheap and ubiquitous access to mobile city services. However, the differences in intent, philosophy, and technical realization between community and municipal Wi-Fi networks prevent a straight-forward combination of both approaches. In this paper, we highlight the conceptual and technical challenges that need to be solved to create collaborative municipal Wi-Fi networks.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-percomws-collaborative-municipal-wi-fi.pdf}, misc2 = {Print}, publisher = {IEEE Press}, address = {Washington, DC, USA}, booktitle = {Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany.}, event_place = {Mannheim, Germany}, event_name = {Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010)}, event_date = {April 02, 2010}, language = {en}, ISBN = {978-1-4244-6605-4}, DOI = {10.1109/PERCOMW.2010.5470505}, author = {Heer, Tobias and Hummen, Ren{\'e} and Viol, Nicolai and Wirtz, Hanno and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { DBLP:conf/webist/ChristophGK10, title = {Efficient Literature Research based on Semantic Tagnets - Implemented and Evaluated for a German Text-corpus}, year = {2010}, month = {4}, volume = {2}, pages = {48-54}, misc2 = {Print}, editor = {Joaquim Filipe and Jos{\'e} Cordeiro}, publisher = {INSTICC Press}, booktitle = {WEBIST 2010, Proceedings of the 6th International Conference on Web Information Systems and Technologies, Valencia, Spain}, language = {en}, ISBN = {978-989-674-025-2}, author = {Christoph, Uta and G{\"o}tten, Daniel and Krempels, Karl-Heinz} } @Inbook { 2010-02-book-alizai-hardware-and-systems, title = {Tools and Modeling Approaches for Simulating Hardware and Systems}, year = {2010}, month = {2}, volume = {1}, pages = {99-117}, url = {http://www.network-simulation.info/}, web_url = {http://www.amazon.com/Modeling-Tools-Network-Simulation-Wehrle/dp/3642123309}, misc2 = {Print}, publisher = {Springer LNCS}, chapter = {Chapter 7}, booktitle = {Modeling and Tools for Network Simulation}, language = {EN}, ISBN = {978-3-642-12330-6}, author = {Alizai, Muhammad Hamad and Gao, Lei and Kempf, Torsten and Landsiedel, Olaf} } @Book { 2010-kai-euras2, title = {Services Standardisation. Proceedings of the 15th EURAS Conference. EURAS contributions to standardisation research, vol. 2.}, year = {2010}, misc2 = {print}, publisher = {EURAS}, address = {Hamburg, DE}, language = {en}, ISBN = {978-3-86130-245-2}, reviewed = {1}, author = {Graz, Jean-Christophe and Jakobs, Kai} } @Inproceedings { Eisenblaetter10, title = {{A Two-Stage Approach to WLAN Planning: Detailed Performance Evaluation Along the Pareto Frontier}}, year = {2010}, pages = {227 -236}, booktitle = {Proc. of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'10)}, author = {Eisenbl{\"a}tter, Andreas and Geerdes, Hans-Florian and Gross, James and Pu{\~n}al, Oscar and Schweiger, Jonas} } @Inproceedings { 201003GarciaEffContAwareAccControlPMS, title = {Efficient and Context-Aware Access Control for Pervasive Medical Sensor Networks}, year = {2010}, booktitle = {Proceedings of the First IEEE PerCom Workshop on Pervasive Healthcare}, author = {Garcia-Morchon, Oscar and Wehrle, Klaus} } @Inproceedings { 201006GarciaIFIPTM, title = {On Applications of Cooperative Security in Distributed Networks}, year = {2010}, abstract = {ManyapplicationsrunningontheInternetoperateinfullyor semi-distributed fashion including P2P networks or social networks. Dis- tributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability. In particular, faulty or mis- behaving nodes cannot collude to subvert the system operation. This paper addresses the above threats by applying cooperative security techniques to relevant distributed systems in the Internet. Our goal is to present methods that allow the peers to bootstrap basic trust relation- ships at the time of joining a distributed network and remove the peers if trust is lost. We consider the specific security caveats of the analyzed sys- tems, investigate the applicability of existing cooperative security-based protocols, and propose general design guidelines for cooperative-security protocol in described distributed systems.}, misc2 = {Print}, publisher = {Springer}, address = {Berlin}, booktitle = {Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management}, event_place = {Morioka, Japan}, event_name = {4th International Conference on Trust Management}, language = {en}, ISBN = {978-3-642-13445-6}, reviewed = {1}, author = {Kuptsov, Dmitriy and Garcia-Morchon, Oscar and Wehrle, Klaus and Gurtov, Andrei} } @Inproceedings { 201006GarciaSacmat, title = {Modular Context-Aware Access Control for Medical Sensor Network}, year = {2010}, abstract = {Medical sensor networks allow for pervasive health monitoring of users in hospitals, at home, or on the way. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that unauthorized parties cannot retrieve confidential information. This is a great challenge due to two main reasons. First, wireless sensors are resource-constrained devices that limit the applicability of traditional solutions. Second, the access control system must be context-aware and adapt its security settings to ensure the users' safety during, e.g., medical emergencies. To solve these issues, this paper presents a modular context-aware access control system tailored to pervasive medical sensor networks in which the access control decisions and the response delay depend upon the health acuteness of a user. Our system extends traditional role-based access control systems by allowing for context-awareness in critical, emergency, and normal access control situations. We further present a lightweight encoding for our modular access control policies as well as an access control engine efficiently running on resource-constrained sensor nodes. Finally, we analyze how the proposed access control system suits existing security architectures for medical sensor networks.}, address = {Pittsburgh, USA}, booktitle = {Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT'10)}, organization = {ACM}, ISBN = {978-1-4503-0049-0}, DOI = {10.1145/1809842.1809864}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Wehrle, Klaus} } @Inproceedings { 200912BitschSimBetAge, title = {SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks}, year = {2009}, month = {12}, day = {1}, pages = {13--18}, abstract = {In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.}, tags = {RatPack}, url = {fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1659029.1659034\&coll=DL\&dl=GUIDE\&CFID=6806120\&CFTOKEN=29162094}, web_url2 = {http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf}, misc2 = {Online}, editor = {Paulo Mendes, Oliver Marc{\'e}}, publisher = {ACM}, address = {New York City, NY, USA}, series = {U-NET '09}, booktitle = {Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy}, organization = {ACM}, event_place = {Rome, Italy}, event_name = {1st ACM workshop on User-provided networking: challenges and opportunities}, event_date = {1 Dec. 2009}, language = {en}, ISBN = {978-1-60558-750-9}, DOI = {http://doi.acm.org/10.1145/1659029.1659034}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Viol, Nicolai and Goliath, Andr{\'e} and Wehrle, Klaus} } @Inproceedings { 2009-sensys-alizai-burstytraffic, title = {Bursty Traffic over Bursty Links}, year = {2009}, month = {11}, pages = {71-84}, tags = {wld}, url = {fileadmin/papers/2009/2009-alizai-sensys-bre.pdf}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA}, event_place = {Berkley, California}, event_name = {Sensys 09}, event_date = {November 2009}, language = {en}, ISBN = {978-1-60558-519-2}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Techreport { 200908alizaifgsnburstyrouting, title = {Routing Over Bursty Wireless Links}, year = {2009}, month = {9}, pages = {63-66}, abstract = {Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22\% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.}, tags = {wld}, url = {fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf}, web_url = {doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf}, misc2 = {Print}, publisher = {Technical University Hamburg}, address = {Technical University Hamburg}, booktitle = {Proceedings of the 8th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Hamburg, Germany}, language = {en}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { 2009-landsiedel-visa-vipe, title = {A Virtual Platform for Network Experimentation}, year = {2009}, month = {8}, day = {17}, pages = {45--52}, abstract = {Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive. In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.}, keywords = {deployment, network experimentation, resource virtualization, simulation}, url = {fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf}, misc2 = {Print}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures}, event_date = {August 17, 2009}, language = {en}, ISBN = {978-1-60558-595-6}, DOI = {10.1145/1592648.1592657}, reviewed = {1}, author = {Landsiedel, Olaf and Kunz, Georg and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { securityforpervasivemedicalsensornetworks, title = {Security for Pervasive Medical Sensor Networks}, year = {2009}, month = {7}, day = {13}, volume = {1}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-garcia-mobiq.pdf}, misc2 = {Print}, publisher = {IEEE Press}, address = {Washington, DC, USA}, booktitle = {6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto}, organization = {ICST/IEEE}, event_place = {Toronto, CAN}, event_name = {6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)}, language = {en}, ISBN = {978-963-9799-59-2}, DOI = {10.4108/ICST.MOBIQUITOUS2009.6832}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Falck, Thomas and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 200907BitschMOBIQUITOUS09SimBetAge, title = {SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking}, year = {2009}, month = {7}, day = {13}, pages = {1--2}, abstract = {In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs.}, note = {poster and abstract}, tags = {RatPack}, url = {fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363}, misc2 = {Online}, publisher = {IEEE}, address = {New York City, NY, USA}, booktitle = {Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada}, organization = {ICST/IEEE}, event_place = {Toronto, ON, Canada}, event_name = {6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)}, event_date = {July 13-16, 2009}, language = {en}, ISBN = {978-963-9799-59-2}, DOI = {10.4108/ICST.MOBIQUITOUS2009.7017}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Viol, Nicolai and Goliath, Andr{\'e} and Wehrle, Klaus} } @Conference { 2009-iscc-samad-NNCQ, title = {Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks}, year = {2009}, month = {7}, day = {5}, pages = {763-769}, misc2 = {Online}, publisher = {IEEE}, booktitle = {IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia}, event_place = {Sousse, Tunisia}, event_name = {IEEE Symposium on Computers and Communications}, language = {en}, ISBN = {978-1-4244-4671-1}, author = {Ali Makram, Sadeq and Samad, Fahad and Guenes, Mesut} } @Poster { 2009-kunz-nsdi-profab, title = {Poster Abstract: Protocol Factory: Reuse for Network Experimentation}, year = {2009}, month = {4}, day = {22}, url = {fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf}, misc = {Poster}, misc2 = {Online}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, booktitle = {6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)}, language = {en}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and G{\"o}tz, Stefan and Wehrle, Klaus} } @Article { Gross09a, title = {{Enhancing IEEE 802.11a/n with Dynamic Single-User OFDM Adaptation}}, journal = {Elsevier Performance Evaluation Journal}, year = {2009}, volume = {66}, number = {3-5}, pages = {240--257}, author = {Gross, James and Emmelmann, Marc and Pu{\~n}al, Oscar and Wolisz, Adam} } @Inproceedings { Gross09, title = {{Multi-User OFDMA Frame Aggregation for Future Wireless Local Area Networking}}, year = {2009}, pages = {220--233}, booktitle = {Proc. of the 8th International IFIP Networking Conference (NETWORKING'09)}, author = {Gross, James and Pu{\~n}al, Oscar and Emmelmann, Marc} } @Inproceedings { 200906MobiArchgoetzprotocolorchestration, title = {Protocol Orchestration: A Semantic Approach to Communication Stacks}, year = {2009}, pages = {43-50}, abstract = {The diversity of today's networking environments, such as wired, wireless, cell-based, or multi-hop, is matched by an equally large amount and heterogeneity of specialized protocols, e.g., overlays, Wi-Fi positioning, MANET routing, cross-layer signaling. However, communication is typically performed with a static set of protocols selected at design time based on simplified assumptions ignoring the environment's heterogeneity. In this paper, we argue that protocols can be orchestrated as software components driven purely by their functionality and the demands of the execution environment. Our end-system protocol framework Adapt bases on extensible ontological models that semantically describe protocol and environment properties. At runtime, each connection receives a custom-tailored protocol stack that Adapt orchestrates from the requirements derived from the application, user, and environment. With this approach, end-systems can reason about the functionality and quality of automatically composed and adapted protocol compounds while remaining open to existing and future protocols.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-goetz-mobiarch-protocol-orchestration.pdf}, misc2 = {print}, editor = {Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca}, publisher = {ACM}, address = {New York, NY, USA}, howpublished = {print}, booktitle = {Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09)}, organization = {ACM Sigcomm/Sigmobile}, event_place = {Krakow, Poland}, event_name = {Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09), Krakow, Poland}, event_date = {2009-06-22}, language = {en}, reviewed = {1}, author = {G{\"o}tz, Stefan and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 2009morchonpodckeyagreementwsn, title = {Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks}, year = {2009}, volume = {1}, pages = {326-327}, note = {Brief Announcement}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), Calgary}, event_place = {Calgary, CN}, event_name = {28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009)}, language = {en}, ISBN = {978-963-9799-59-2}, DOI = {10.1145/1582716.1582791}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Heer, Tobias and Tolhuizen, Ludo and Wehrle, Klaus} } @Inproceedings { 2009-icc-heer-middleboxes, title = {End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace}, year = {2009}, volume = {1}, pages = {791-796}, abstract = {Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf}, misc2 = {Print}, publisher = {Piscataway, NJ, USA}, address = {Dresden, Germany}, booktitle = {Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany}, organization = {IEEE}, event_place = {Dresden, Germany}, event_name = {IEEE International Conference on Communications 2009 (ICC 2009)}, language = {en}, ISBN = {978-1-4244-3435-0}, ISSN = {1938-1883}, DOI = {10.1109/ICC.2009.5198984}, reviewed = {1}, author = {Heer, Tobias and Hummen, Ren{\'e} and Komu, Miika and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { goetz2008adapt, title = {ADAPT: A Semantics-Oriented Protocol Architecture}, year = {2008}, month = {12}, day = {10}, volume = {5343/2008}, pages = {287-292}, abstract = {Although modularized protocol frameworks are flexible and adaptive to the increasing heterogeneity of networking environments, it remains a challenge to automatically compose communication stacks from protocol modules. The typical static classification into network layers or class hierarchies cannot appropriately accommodate cross-cutting changes such as overlay routing or cross-layer signaling. In this paper, we discuss how protocol composition can be driven by functionality and demand at runtime based on extensible semantic models of protocols and their execution environment. Such an approach allows to reason about the functionality and quality of automatically composed and adapted protocol compounds and it is open to existing and future protocols.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-goetz-mobiarch-adapt.pdf}, misc2 = {Print}, editor = {Karin Anna Hummel and James P. G. Sterbenz}, publisher = {Springer-Verlag}, address = {Tiergartenstra{\ss}e 17, 69121 Heidelberg, Germany}, series = {Lecture Notes in Computer Science}, booktitle = {Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {3rd International Workshop on Self-Organizing Systems (IWSOS)}, event_date = {2008-12-10}, language = {en}, ISBN = {978-3-540-92156-1}, DOI = {10.1007/978-3-540-92157-8\textbackslash_27}, reviewed = {1}, author = {G{\"o}tz, Stefan and Beckel, Christian and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { heer-2008-conext-alpha, title = {ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication}, year = {2008}, month = {12}, volume = {1}, pages = {23:1--23:12}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-conext-alpha.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, series = {CoNEXT '08}, booktitle = {Proceedings of the 2008 ACM CoNEXT Conference, Madrid, Spain}, event_place = {Madrid, Spain}, event_name = {ACM Conext 2008}, event_date = {December 2008}, language = {en}, ISBN = {978-1-60558-210-8}, DOI = {10.1145/1544012.1544035}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Garcia-Morchon, Oscar and Wehrle, Klaus} } @Conference { 2008-heer-pisa-full, title = {Secure Wi-Fi Sharing at Global Scales}, year = {2008}, month = {6}, day = {16}, volume = {1}, pages = {1-7}, abstract = {The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet uplinks among users has first become popular in communities of individuals and has recently been adopted as a business model by several companies. However, existing implementations and proposals suffer from the security risks of directly providing Internet access to strangers. In this paper, we present the P2P Wi-Fi Internet Sharing Architecture PISA, which eliminates these risks by introducing secure tunneling, cryptographic identities, and certificates as primary security concepts. Thus, PISA offers nomadic users the same security that they expect from a wired Internet connection at home. Based on its three fundamental mechanisms, PISA achieves a flexibility which opens significant advantages over existing systems. They include user mobility, anonymity, service levels with different performance and availability characteristics, and different revenue models for operators. With this combination of key features, PISA forms an essential basis for global, seamless, and secure Wi-Fi sharing for large communities.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-ict-secure-wifi.pdf}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, booktitle = {Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation}, event_place = {St. Petersburg, Russian Federation}, event_name = {15th International Conference on Telecommunication (ICT)}, event_date = {16-19 June 2008}, language = {en}, ISBN = {978-1-4244-2035-3}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { wessel2008GMDS, title = {Software-Engineering in Multidisciplinary Teams in Health Informatics: Quality Assurance with GREME Reviews}, year = {2008}, pages = {665-667}, publisher = {German Medical Science GMS Publishing House}, booktitle = {53. Jahrestagung der Deutschen Gesellschaft f{\"u}r Medizinische Informatik, Biometrie und Epidemiologie (gmds). Br{\"u}ckenschlag von Medizinischer Informatik, Biometrie und Epidemiologie zur Medizintechnik, Stuttgart, Germany}, language = {en}, author = {We{\ss}el, Christa and Geisler, Sandra and Christoph, Uta} } @Inproceedings { Gross07, title = {{Dynamic Single-User OFDM Adaptation for IEEE 802.11 Systems}}, year = {2007}, pages = {124--132}, booktitle = {Proc. of ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'07)}, author = {Gross, James and Emmelmann, Marc and Pu{\~n}al, Oscar and Wolisz, Adam} } @Inproceedings { GarciaMorchonEtAl2007, title = {Cooperative Security in Distributed Sensor Networks}, year = {2007}, volume = {1}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, series = {1}, booktitle = {Proceedings of the third International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007}, organization = {IEEE}, event_name = {CollaborateCom}, language = {en}, ISBN = {978-1-4244-1318-8}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Baldus, Heribert and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 2006-heer-percomws-adapt-dht, title = {Adapting Distributed Hash Tables for Mobile Ad Hoc Networks}, year = {2006}, month = {3}, day = {16}, volume = {1}, pages = {1-6}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2006-heer-percomws-dht-adhoc.pdf}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, booktitle = {In Proceedings of 3. IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P'06), Pisa, Italy.}, event_place = {Pisa, Italy}, event_name = {IEEE International Workshop on Mobile Peer-to-Peer Computing}, event_date = {March 2006}, language = {en}, ISBN = {0-7695-2520-2}, DOI = {10.1109/PERCOMW.2006.16}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Rieche, Simon and Wehrle, Klaus} } @Inproceedings { 200608landsiedelp2p06scalablemobility, title = {Towards Scalable Mobility in Distributed Hash Tables}, year = {2006}, pages = {203-209}, abstract = {For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, we explore how DHTs and mobile ad-hoc networks (MANETs) fit together. We argue that both share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we argue that with little global knowledge, such as a map of the city or whatever area the nodes move in, one can even further improve the scalability and reduce DHT maintenance overhead significantly, allowing MHT to scale up to several ten thousands of nodes.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2006/2006-landsiedel-p2p-mobility.pdf}, misc2 = {print}, publisher = {IEEE}, address = {Washington, DC, USA}, howpublished = {print}, booktitle = {Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), Cambridge, UK}, organization = {IEEE}, event_place = {Cambridge, UK}, event_name = {Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06)}, event_date = {2006-09-06}, language = {en}, ISBN = {0-7695-2679-9}, DOI = {10.1109/P2P.2006.46}, reviewed = {1}, author = {Landsiedel, Olaf and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { 200503goetzp2psawindowsfilesharing, title = {Spontaneous Windows File Sharing via Virtual Groups}, year = {2005}, month = {2}, day = {28}, volume = {61}, pages = {143-146}, abstract = {Although File and printer sharing services have been deployed almost ubiquitously for a long time as part of Microsoft Windows, only recent peer-to-peer applications popularized file-sharing on a global scale. As the Windows CIFS protocol was designed for local area networks, its use has been con?ned to relatively small environments. We propose a mechanism to set up spontaneous virtual groups that allow to use legacy Windows file and printer sharing globally in virtual LANs.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2005-goetz-kivs-spontaneous-file-sharing.pdf}, misc2 = {print}, editor = {Paul M{\"u}ller, Reinhard Gotzhein, Jens B. Schmitt}, publisher = {Gesellschaft f{\"u}r Informatik (GI)}, address = {Bonn, Germany}, howpublished = {print}, series = {LNI}, booktitle = {Proceedings of Workshop on Peer-to-Peer-Systems and -Applications}, organization = {Gesellschaft f{\"u}r Informatik (GI)}, event_place = {Kaiserslautern, Germany}, event_name = {Kommunikation in Verteilten Systemen (KiVS), Kaiserslautern, Germany}, event_date = {2005-02-28}, language = {en}, ISBN = {3-88579-390-3}, reviewed = {1}, author = {G{\"o}tz, Stefan and Wehrle, Klaus} } @Inbook { 200509riechep2pbookreliability, title = {Reliability and Load Balancing in Distributed Hash Tables}, year = {2005}, pages = {119-135}, editor = {Ralf Steinmetz, Klaus Wehrle}, publisher = {Springer}, address = {Heidelberg, Germany}, series = {Lecture Notes in Computer Science, LNCS}, chapter = {9}, booktitle = {Peer-to-Peer Systems and Applications}, author = {Rieche, Simon and Niedermayer, Heiko and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inbook { 200509goetzp2pbookdhtalgorithms, title = {Selected Distributed Hash Table Algorithms}, year = {2005}, pages = {95-117}, editor = {Ralf Steinmetz, Klaus Wehrle}, publisher = {Springer}, address = {Heidelberg, Germany}, series = {Lecture Notes in Computer Science, LNCS}, chapter = {8}, booktitle = {Peer-to-Peer Systems and Applications}, author = {G{\"o}tz, Stefan and Rieche, Simon and Wehrle, Klaus} } @Inbook { 200509wehrlep2pbookdhts, title = {Distributed Hash Tables}, year = {2005}, pages = {79-93}, editor = {Ralf Steinmetz, Klaus Wehrle}, publisher = {Springer}, address = {Heidelberg, Germany}, series = {Lecture Notes in Computer Science, LNCS}, chapter = {7}, booktitle = {Peer-to-Peer Systems and Applications}, author = {Wehrle, Klaus and G{\"o}tz, Stefan and Rieche, Simon} } @Inproceedings { 200503landsiedelfgsnaeon, title = {Project AEON}, year = {2005}, number = {481}, pages = {72-76}, abstract = {Power consumption is a crucial characteristic of sensor networks and their applications, as sensor nodes are commonly battery driven. Although recent research focuses strongly on energy aware applications and operating systems, power consumption is still a limiting factor. Once sensor nodes are deployed, it is challenging and sometimes even impossible to change batteries. As a result, erroneous lifetime prediction causes high costs and may render a sensor network useless, before its purpose is fulfilled. In this paper we present AEON, a novel evaluation tool to quantitatively predict power consumption of sensor nodes and whole sensor networks. Our energy model, based on measurements of node current draw and the execution of real code, enables accurate prediction of the actual power consumption of sensor nodes. Consequently, preventing erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency.}, address = {Z{\"u}rich, CH}, booktitle = {Proceedings of the 4th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Techical Report No. 481}, author = {Landsiedel, Olaf and Wehrle, Klaus and Rieche, Simon and G{\"o}tz, Stefan and Petrak, Leo} } @Inproceedings { 200511goetzmmsctransparent, title = {Transparent End-Host-Based Service Composition through Network Virtualization}, year = {2005}, pages = {31-36}, abstract = {Mobile devices have become a popular medium for delivering multimedia services to end users. A large variety of solutions have been proposed to flexibly compose such services and to provide quality-of-service guarantees for the resulting contents. However, low-level mobility artifacts resulting from network transitions (disconnected operation, reconfiguration, etc.) still prevent a seamless user experience of these technologies. This paper presents an architecture for supporting legacy applications with such solutions in mobile scenarios. Through network virtualization, it hides mobility artifacts and ensures connectivity at the network and transport level. Its adoption for multimedia applications poses unique challenges and advantages, which are discussed herein.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2005-goetz-mmc-transparent-service-composition.pdf}, misc2 = {print}, editor = {Wolf-Tilo Balke and Klara Nahrstedt}, publisher = {ACM}, address = {New York, NY, USA}, howpublished = {print}, booktitle = {Proceedings of the First ACM International Workshop on Multimedia Service Composition at International Multimedia Conference}, organization = {ACM}, event_place = {Singapore}, event_name = {First ACM International Workshop on Multimedia Service Composition at International Multimedia Conference, Singapore}, event_date = {2005-08-01}, language = {en}, ISBN = {1-59593-245-3}, DOI = {10.1145/1099423.1099430}, reviewed = {1}, author = {G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { 200410riechehotp2preliability, title = {Reliability of Data in Structured Peer-to-Peer Systems}, year = {2004}, month = {10}, pages = {108-113}, abstract = {Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. For this purpose Distributed Hash Tables (DHT) offer a highly scalable and self-organizing paradigm for efficient distribution and retrieval of data. Thereby a common assumption of P2P-Systems is, that the participating nodes are unreliable and may fail at any time. Since many of research goes into the design of DHT lookup services, these systems aim to provide a stable global addressing structure. But to storage data reliable in a DHT only few techniques were already developed. However since data has to be stored persistent in the network, it should be retrieved anytime, even if nodes fail. In this work we discuss possibilities to store data fault tolerant in a structured Peer-to-Peer system.}, misc2 = {Print}, booktitle = {Proceedings of HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)}, event_place = {Volendam, Netherlands}, event_name = {HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer}, event_date = {Oct. 2004}, language = {en}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Landsiedel, Olaf and G{\"o}tz, Stefan and Petrak, Leo} } @Inproceedings { 200410wehrlefgpcintegriertekonstruktionsmethode, title = {Integrierte Konstruktionsmethoden f{\"u}r flexible Protokolle in ubiquit{\"a}ren Kommunikationssystemen}, year = {2004}, address = {Stuttgart, Germany}, booktitle = {Proceedings of the GI/ITG KuVS Fachgespr{\"a}ch Systemsoftware f{\"u}r Pervasive Computing}, author = {Wehrle, Klaus and Landsiedel, Olaf and Rieche, Simon and G{\"o}tz, Stefan and Petrak, Leo} } @Inproceedings { 200407wehrlesmsoipncontentoriented, title = {Content-oriented Bridging of Today's Internet Heterogeneity}, year = {2004}, number = {04411}, editor = {Matthias Bossardt and Georg Carle and D. Hutchison and Hermann de Meer and Bernhard Plattner}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, series = {Dagstuhl Seminar Proceedings}, booktitle = {Service Management and Self-Organization in IP-based Networks}, author = {Wehrle, Klaus and G{\"o}tz, Stefan} }