This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-09-17
Creation time: 11-13-20
--- Number of references
16
inproceedings
Varj1112:Secure
Secure Resolution of <prt>End-Host</prt> Identifiers for Mobile Clients
2011
12
5
Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT
DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution
fileadmin/papers/2011/2011-varjonen-secure.pdf
Online
IEEE
Piscataway, NJ, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award
accepted
en
978-1-4244-9268-8
1930-529X
1
SamuVarjonen
TobiasHeer
KennethRimey
AndreiGurtov
techreport
2011-draft-garcia-core-security-03
Security Considerations in the IP-based Internet of Things
2011
10
31
draft-garcia-core-security-03
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-03
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
Dombrowski2011LCN
Hard Real-Time Wireless Medium Access in Action: Stop the Guillotine Within a Millisecond!
2011
10
4
1--3
http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_dombrowski.pdf
http://www.ieeelcn.org/prior/LCN36/lcn36demos.html
Proc. of Local Computer Networks Conference, Demonstrations, (LCN'11)
Bonn, Germany
36th IEEE Conference on Local Computer Networks (LCN)
04/10/2011
1
ChristianDombrowski
JamesGross
article
2011-heer-iot-journal
Security Challenges in the IP-based Internet of Things
Springer Wireless Personal Communications Journal
2011
10
61
3
527-542
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.
iotsec
fileadmin/papers/2011/2011-heer-iot-challenges.pdf
Online
Springer
Netherlands
en
0929-6212
10.1007/s11277-011-0385-5
1
TobiasHeer
OscarGarcia-Morchon
RenéHummen
Sye LoongKeoh
Sandeep S.Kumar
KlausWehrle
inproceedings
2011-wintech-alizai-tinywifi
TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers
2011
9
19-27
tinywifi
fileadmin/papers/2011/2010-09-tinywifi-alizai-wintech.pdf
Online
ACM
New York, NY, USA
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH ), Las Vegas, NV, USA
Las Vegas, NV, USA
The 17th Annual International Conference on Mobile Computing and Networking
September 2011
en
978-1-4503-0867-0
10.1145/2030718.2030725
1
Muhammad HamadAlizai
HannoWirtz
BernhardKirchen
TobiasVaegs
OmprakashGnawali
KlausWehrle
inproceedings
2011-kunz-mascots-performance-prediction
Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations
2011
7
25
359 - 368
horizon
fileadmin/papers/2011/2011-kunz-performance-prediction-mascots.pdf
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'11), Singapore
Singapore
19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
July 25-17, 2011
en
978-1-4577-0468-0
1526-7539
10.1109/MASCOTS.2011.15
1
GeorgKunz
SimonTenbusch
JamesGross
KlausWehrle
techreport
2011-draft-garcia-core-security-02
Security Considerations in the IP-based Internet of Things
2011
7
11
draft-garcia-core-security-02
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-02
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
2011-iscc-alizai-ble
Efficient Online Estimation of Bursty Wireless Links
2011
6
fileadmin/papers/2011/2011-alizai-iscc-ble.pdf
Online
IEEE Computer Society
Los Alamitos, CA, USA
16th IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece
Kerkyra, Greece
en
978-1-4577-0678-3
10.1109/ISCC.2011.5983839
1
Muhammad HamadAlizai
HannoWirtz
GeorgKunz
BenjaminGrap
KlausWehrle
inproceedings
Dombrowski2011RealWIN
Reducing Outage Probability Over Wireless Channels Under Hard Real-time Constraints
2011
4
11
1 -6
Proc. of Workshop on Real-Time Wireless For Industrial Applications (RealWIN'11)
1
ChristianDombrowski
JamesGross
inproceedings
2011-ipsn-alizai-pad
Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks
2011
4
fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf
Online
ACM
New York, NY, USA
Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA
Chicago, IL, USA
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
StefanGötz
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2011-kunz-omnetpp-horizon
Runtime Efficient Event Scheduling in Multi-threaded Network Simulation
2011
3
21
359-366
Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation.
We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \emph{push-based event handling scheme} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \emph{event scheduling algorithm} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.
horizon
fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf
Online
ICST
Brussels, Belgium
Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain
Barcelona, Spain
4th International Workshop on OMNeT++ (OMNeT++'11)
March 21, 2011
en
978-1-936968-00-8
10.4108/icst.simutools.2011.245504
1
GeorgKunz
MirkoStoffers
JamesGross
KlausWehrle
techreport
2011-draft-garcia-core-security-01
Security Considerations in the IP-based Internet of Things
2011
3
14
draft-garcia-core-security-01
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-01
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2011-draft-garcia-core-security-00
Security Considerations in the IP-based Internet of Things
2011
3
7
draft-garcia-core-security-00
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-00
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
PunalScOff11
<prt>Combined Subcarrier Switch Off and Power Loading for 80 MHz Bandwidth WLANs</prt>
2011
Proc. of the 18th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN'11)
OscarPuñal
JamesGross
inproceedings
Punal11
<prt>Performance Comparison of Loading Algorithms for 80 MHz IEEE 802.11 WLANs</prt>
2011
124--132
Proc. of the 73rd IEEE Vehicular Technology Conference (VTC-Spring'11)
OscarPuñal
HumbertoEscudero
JamesGross
inproceedings
Li2011ICC
<prt>Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access</prt>
2011
1 -6
Proc. of IEEE International Conference on Communications (ICC'11)
DiLi
JamesGross