This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2023-05-28
Creation time: 11-06-19
--- Number of references
147
incollection
2023_pennekamp_crd-a.i
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead
2023
2
8
The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.
Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf
Springer
Internet of Production: Fundamentals, Applications and Proceedings
978-3-030-98062-7
10.1007/978-3-030-98062-7_2-1
1
JanPennekamp
AnastasiiaBelova
ThomasBergs
MatthiasBodenbenner
AndreasBührig-Polaczek
MarkusDahlmanns
IkeKunze
MoritzKröger
SandraGeisler
MartinHenze
DanielLütticke
BenjaminMontavon
PhilippNiemietz
LuciaOrtjohann
MaximilianRudack
Robert H.Schmitt
UweVroomen
KlausWehrle
MichaelZeng
incollection
2023_klugewilkes_crd-b2.iv
Modular Control and Services to Operate Line-less Mobile Assembly Systems
2023
2
8
The increasing product variability and lack of skilled workers demand for autonomous, flexible production. Since assembly is considered a main cost driver and accounts for a major part of production time, research focuses on new technologies in assembly. The paradigm of Line-less Mobile Assembly Systems (LMAS) provides a solution for the future of assembly by mobilizing all resources. Thus, dynamic product routes through spatiotemporally configured assembly stations on a shop floor free of fixed obstacles are enabled. In this chapter, we present research focal points on different levels of LMAS, starting with the macroscopic level of formation planning, followed by the mesoscopic level of mobile robot control and multipurpose input devices and the microscopic level of services, such as interpreting autonomous decisions and in-network computing. We provide cross-level data and knowledge transfer through a novel ontology-based knowledge management. Overall, our work contributes to future safe and predictable human-robot collaboration in dynamic LMAS stations based on accurate online formation and motion planning of mobile robots, novel human-machine interfaces and networking technologies, as well as trustworthy AI-based decisions.
Lineless mobile assembly systems (LMAS); Formation planning; Online motion planning; In-network computing; Interpretable AI; Human-machine collaboration; Ontology-based knowledge management
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-klugewilkes-iop-b2.iv.pdf
Springer
Internet of Production: Fundamentals, Applications and Proceedings
978-3-030-98062-7
10.1007/978-3-030-98062-7_13-1
1
AlineKluge-Wilkes
RalphBaier
DanielGossen
IkeKunze
AleksandraMüller
AmirShahidi
DominikWolfschläger
ChristianBrecher
BurkhardCorves
MathiasHüsing
VerenaNitsch
Robert H.Schmitt
KlausWehrle
article
2023_pennekamp_purchase_inquiries
Offering Two-Way Privacy for Evolved Purchase Inquiries
ACM Transactions on Internet Technology
2023
Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today's established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches' scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.
bootstrapping procurement; secure industrial collaboration; private set intersection; homomorphic encryption; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-purchase-inquiries.pdf
ACM
accepted
1533-5399
10.1145/3599968
1
JanPennekamp
MarkusDahlmanns
FrederikFuhrmann
TimoHeutmann
AlexanderKreppein
DennisGrunert
ChristophLange
Robert H.Schmitt
KlausWehrle
inproceedings
2022-wireless-anycast
Harnessing Cooperative Anycast Communication for Increased Resilience in Wireless Control
Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)
2022
12
reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-glebke-wireless-anycast.pdf
IEEE
Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)
10.1109/CDC51059.2022.9992864
1
RenéGlebke
JanScheiper
StefanLenz
MirkoStoffers
KlausWehrle
techreport
draft-irtf-coinrg-use-cases-02
Use Cases for In-Network Computing
2022
3
draft-irtf-coinrg-use-cases-02
expires: 8 September 2022 (work in progress)
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf
https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/
Online
IETF Trust
Internet Drafts
Internet Engineering Task Force
Internet Engineering Task Force
IkeKunze
KlausWehrle
DirkTrossen
Marie-JoséMontpetit
Xavierde Foy
DavidGriffin
MiguelRio
inproceedings
2021_pennekamp_bootstrapping
Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships
2021
11
15
RWTH-2021-09499
In addition to quality improvements and cost reductions, dynamic and flexible business relationships are expected to become more important in the future to account for specific customer change requests or small-batch production. Today, despite reservation, sensitive information must be shared upfront between buyers and sellers. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness following information leaks or breaches of their privacy. To address this issue, the concepts of confidential computing and cloud computing come to mind as they promise to offer scalable approaches that preserve the privacy of participating companies. In particular, designs building on confidential computing can help to technically enforce privacy. Moreover, cloud computing constitutes an elegant design choice to scale these novel protocols to industry needs while limiting the setup and management overhead for practitioners. Thus, novel approaches in this area can advance the status quo of bootstrapping new relationships as they provide privacy-preserving alternatives that are suitable for immediate deployment.
bootstrapping procurement; business relationships; secure industrial collaboration; privacy; Internet of Production
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-bootstrapping.pdf
RWTH Aachen University
Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea
RWTH Aachen University
Seoul, Korea
November 14, 2021
10.18154/RWTH-2021-09499
JanPennekamp
FrederikFuhrmann
MarkusDahlmanns
TimoHeutmann
AlexanderKreppein
DennisGrunert
ChristophLange
Robert H.Schmitt
KlausWehrle
inproceedings
2021-kunze-signal-detection
Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing
2021
6
10
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-signal-detection.pdf
IEEE
Proceedings of the 2021 IEEE 30th International Symposium
on Industrial Electronics (ISIE)
978-1-7281-9023-5
2163-5145
10.1109/ISIE45552.2021.9576221
1
IkeKunze
PhilippNiemietz
LiamTirpitz
RenéGlebke
DanielTrauth
ThomasBergs
KlausWehrle
inproceedings
2021-glebke-service-based-forwarding
Service-based Forwarding via Programmable Dataplanes
2021
6
10
reflexes
/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf
IEEE
Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)
978-1-6654-4005-9
2325-5609
10.1109/HPSR52026.2021.9481814
1
RenéGlebke
DirkTrossen
IkeKunze
DavidLou
JanRüth
MirkoStoffers
KlausWehrle
inproceedings
2021_mangel_reshare
Data Reliability and Trustworthiness through Digital Transmission Contracts
2021
6
8
12731
265-283
As decision-making is increasingly data-driven, trustworthiness and reliability of the underlying data, e.g., maintained in knowledge graphs or on the Web, are essential requirements for their usability in the industry. However, neither traditional solutions, such as paper-based data curation processes, nor state-of-the-art approaches, such as distributed ledger technologies, adequately scale to the complex requirements and high throughput of continuously evolving industrial data. Motivated by a practical use case with high demands towards data trustworthiness and reliability, we identify the need for digitally-verifiable data immutability as a still insufficiently addressed dimension of data quality. Based on our discussion of shortcomings in related work, we thus propose ReShare, our novel concept of digital transmission contracts with bilateral signatures, to address this open issue for both RDF knowledge graphs and arbitrary data on the Web. Our quantitative evaluation of ReShare’s performance and scalability reveals only moderate computation and communication overhead, indicating significant potential for cost-reductions compared to today’s approaches. By cleverly integrating digital transmission contracts with existing Web-based information systems, ReShare provides a promising foundation for data sharing and reuse in Industry 4.0 and beyond, enabling digital accountability through easily-adoptable digitally-verifiable data immutability and non-repudiation.
Lecture Notes in Computer Science (LNCS), Volume 12731
Digital transmission contracts; Trust; Data immutability; Non-repudiation; Accountability; Data dynamics; Linked Data; Knowledge graphs
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-mangel-eswc-reshare.pdf
Springer
Proceedings of the 18th Extended Semantic Web Conference (ESWC '21), June 6-10, 2021, Heraklion, Greece
Heraklion, Greece
June 6-10, 2021
978-3-030-77384-7
0302-9743
10.1007/978-3-030-77385-4_16
1
SimonMangel
LarsGleim
JanPennekamp
KlausWehrle
StefanDecker
inproceedings
2021_gleim_factstack
FactStack: Interoperable Data Management and Preservation for the Web and Industry 4.0
2021
5
31
371-395
Data exchange throughout the supply chain is essential for the agile and adaptive manufacturing processes of Industry 4.0. As companies employ numerous, frequently mutually incompatible data management and preservation approaches, interorganizational data sharing and reuse regularly requires human interaction and is thus associated with high overhead costs. An interoperable system, supporting the unified management, preservation and exchange of data across organizational boundaries is missing to date. We propose FactStack, a unified approach to data management and preservation based upon a novel combination of existing Web-standards and tightly integrated with the HTTP protocol itself. Based on the FactDAG model, FactStack guides and supports the full data lifecycle in a FAIR and interoperable manner, independent of individual software solutions and backward-compatible with existing resource oriented architectures. We describe our reference implementation of the approach and evaluate its performance, showcasing scalability even to high-throughput applications. We analyze the system's applicability to industry using a representative real-world use case in aircraft manufacturing based on principal requirements identified in prior work. We conclude that FactStack fulfills all requirements and provides a promising solution for the on-demand integration of persistence and provenance into existing resource-oriented architectures, facilitating data management and preservation for the agile and interorganizational manufacturing processes of Industry 4.0. Through its open source distribution, it is readily available for adoption by the community, paving the way for improved utility and usability of data management and preservation in digital manufacturing and supply chains.
Lecture Notes in Informatics (LNI), Volume P-312
Web Technologies; Data Management; Memento; Persistence; PID; Industry 4.0
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2021/2021-gleim-btw-iop-interoperability-realization.pdf
Gesellschaft für Informatik
Proceedings of the 19th Symposium for Database Systems for Business, Technology and Web (BTW '21), September 13-17, 2021, Dresden, Germany
Dresden, Germany
September 13-17, 2021
978-3-88579-705-0
1617-5468
10.18420/btw2021-20
1
LarsGleim
JanPennekamp
LiamTirpitz
SaschaWelten
FlorianBrillowski
StefanDecker
inproceedings
2021-kunze-coordinate-transformation
Investigating the Applicability of In-Network Computing to Industrial Scenarios
2021
5
11
334-340
in-network computing; latency; approximation
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf
IEEE
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21)
978-1-7281-6207-2
10.1109/ICPS49255.2021.9468247
1
IkeKunze
RenéGlebke
JanScheiper
MatthiasBodenbenner
Robert H.Schmitt
KlausWehrle
inproceedings
2021-kunze-aqm-tofino-p4
Tofino + P4: A Strong Compound for AQM on High-Speed Networks?
2021
5
72-80
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf
IFIP/IEEE
Proceedings of the International Symposium on Integrated Network Management (IM '21)
Virtual Event
International Symposium on Integrated Network Management (IM '21)
May 2021
978-1-7281-9041-9
1
IkeKunze
MoritzGunz
DavidSaam
KlausWehrle
JanRüth
inproceedings
2020_gleim_factdag_provenance
Expressing FactDAG Provenance with PROV-O
2020
11
1
2821
53-58
To foster data sharing and reuse across organizational boundaries, provenance tracking is of vital importance for the establishment of trust and accountability, especially in industrial applications, but often neglected due to associated overhead. The abstract FactDAG data interoperability model strives to address this challenge by simplifying the creation of provenance-linked knowledge graphs of revisioned (and thus immutable) resources. However, to date, it lacks a practical provenance implementation.
In this work, we present a concrete alignment of all roles and relations in the FactDAG model to the W3C PROV provenance standard, allowing future software implementations to directly produce standard-compliant provenance information. Maintaining compatibility with existing PROV tooling, an implementation of this mapping will pave the way for practical FactDAG implementations and deployments, improving trust and accountability for Open Data through simplified provenance management.
Provenance; Data Lineage; Open Data; Semantic Web Technologies; Ontology Alignment; PROV; RDF; Industry 4.0; Internet of Production; IIoT
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-factdag-provenance.pdf
CEUR Workshop Proceedings
Proceedings of the 6th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW '20), co-located with the 19th International Semantic Web Conference (ISWC '20), November 1-6, 2020, Athens, Greece,
Athens, Greece
November 1-6, 2020
1613-0073
1
LarsGleim
LiamTirpitz
JanPennekamp
StefanDecker
inproceedings
2020-kirchhof-wowmom-ccncps
Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation
2020
8
31
internet-of-production, reflexes
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kirchhof-wireless-mac-improvements.pdf
IEEE Computer Society
online
International Symposium on a World of Wireless, Mobile and Multimedia Networks: Workshop on Communication, Computing, and Networking in Cyber Physical Systems (WoWMoM-CCNCPS'2020), August 31 - September 3, 2020, Cork, Ireland
Cork, Ireland
August 31 - September 3, 2020
10.1109/WoWMoM49955.2020.00068
1
Jörg ChristianKirchhof
MartinSerror
RenéGlebke
KlausWehrle
inproceedings
2020-serror-networking-qwin
QWIN: Facilitating QoS in Wireless Industrial Networks Through
Cooperation
2020
6
21
consent
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-serror-qwin.pdf
https://ieeexplore.ieee.org/abstract/document/9142792
IFIP
online
Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France
Paris, France
IFIP NETWORKING Conference
June 22-26, 2020
978-3-903176-28-7
1
MartinSerror
EricWagner
RenéGlebke
KlausWehrle
inproceedings
2020-mann-ur-weldseamstudy
Study on weld seam geometry control for connected gas metal arc welding systems
2020
6
https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf
Proceedings of the 2020 Internal Conference on Ubiquitous Robots
Internal Conference on Ubiquitous Robots
June 22-26, 2020
10.1109/UR49135.2020.9144839
1
SamuelMann
RenéGlebke
IkeKunze
DominikScheurenberg
RahulSharma
UweReisgen
KlausWehrle
DirkAbel
article
2020_gleim_factDAG
FactDAG: Formalizing Data Interoperability in an Internet of Production
IEEE Internet of Things Journal
2020
4
14
7
4
3243-3253
In the production industry, the volume, variety and velocity of data as well as the number of deployed protocols increase exponentially due to the influences of IoT advances. While hundreds of isolated solutions exist to utilize this data, e.g., optimizing processes or monitoring machine conditions, the lack of a unified data handling and exchange mechanism hinders the implementation of approaches to improve the quality of decisions and processes in such an interconnected environment.
The vision of an Internet of Production promises the establishment of a Worldwide Lab, where data from every process in the network can be utilized, even interorganizational and across domains. While numerous existing approaches consider interoperability from an interface and communication system perspective, fundamental questions of data and information interoperability remain insufficiently addressed.
In this paper, we identify ten key issues, derived from three distinctive real-world use cases, that hinder large-scale data interoperability for industrial processes. Based on these issues we derive a set of five key requirements for future (IoT) data layers, building upon the FAIR data principles. We propose to address them by creating FactDAG, a conceptual data layer model for maintaining a provenance-based, directed acyclic graph of facts, inspired by successful distributed version-control and collaboration systems. Eventually, such a standardization should greatly shape the future of interoperability in an interconnected production industry.
Data Management; Data Versioning; Interoperability; Industrial Internet of Things; Worldwide Lab
internet-of-production
https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-iotj-iop-interoperability.pdf
IEEE
2327-4662
10.1109/JIOT.2020.2966402
1
LarsGleim
JanPennekamp
MartinLiebenberg
MelanieBuchsbaum
PhilippNiemietz
SimonKnape
AlexanderEpple
SimonStorms
DanielTrauth
ThomasBergs
ChristianBrecher
StefanDecker
GerhardLakemeyer
KlausWehrle
inproceedings
2019-glebke-in-network-cv
Towards Executing Computer Vision Functionality on Programmable Network Devices
2019
12
9
reflexes,maki,internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf
Online
ACM
1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)
en
978-1-4503-7000-4/19/12
10.1145/3359993.3366646
1
RenéGlebke
JohannesKrude
IkeKunze
JanRüth
FelixSenger
KlausWehrle
inproceedings
2019_pennekamp_securityConsiderations
Security Considerations for Collaborations in an Industrial IoT-based Lab of Labs
2019
12
4
The productivity and sustainability advances for (smart) manufacturing resulting from (globally) interconnected Industrial IoT devices in a lab of labs are expected to be significant. While such visions introduce opportunities for the involved parties, the associated risks must be considered as well. In particular, security aspects are crucial challenges and remain unsolved. So far, single stakeholders only had to consider their local view on security. However, for a global lab, we identify several fundamental research challenges in (dynamic) scenarios with multiple stakeholders: While information security mandates that models must be adapted wrt. confidentiality to address these new influences on business secrets, from a network perspective, the drastically increasing amount of possible attack vectors challenges today's approaches. Finally, concepts addressing these security challenges should provide backwards compatibility to enable a smooth transition from today's isolated landscape towards globally interconnected IIoT environments.
secure industrial collaboration; interconnected cyber-physical systems; stakeholders; Internet of Production
internet-of-production; iotrust
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-security-considerations.pdf
IEEE
Proceedings of the 3rd IEEE Global Conference on Internet of Things (GCIoT '19), December 4–7, 2019, Dubai, United Arab Emirates
Dubai, United Arab Emirates
December 4–7, 2019
978-1-7281-4873-1
10.1109/GCIoT47977.2019.9058413
1
JanPennekamp
MarkusDahlmanns
LarsGleim
StefanDecker
KlausWehrle
inproceedings
2019_pennekamp_infrastructure
Towards an Infrastructure Enabling the Internet of Production
2019
5
8
31-37
New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.
Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration
internet-of-production
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf
IEEE
Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW
Taipei, TW
May 6-9, 2019
978-1-5386-8500-6/19
10.1109/ICPHYS.2019.8780276
1
JanPennekamp
RenéGlebke
MartinHenze
TobiasMeisen
ChristophQuix
RihanHai
LarsGleim
PhilippNiemietz
MaximilianRudack
SimonKnape
AlexanderEpple
DanielTrauth
UweVroomen
ThomasBergs
ChristianBrecher
AndreasBührig-Polaczek
MatthiasJarke
KlausWehrle
article
2019_henze_flexible_netzwerkstrukturen_iop
Flexible Netzwerkarchitekturen für das Internet of Production
ITG-news
2019
4
02/2019
7-8
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-henze-itg-iop-networkarchitectures.pdf
Informationstechnische Gesellschaft im VDE
Frankfurt am Main
MartinHenze
RenéGlebke
KlausWehrle
inproceedings
2019-glebke-wirelessgain
Enabling Wireless Network Support for Gain Scheduled Control
2019
3
25
reflexes,spp
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf
ACM
In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
Dresden, Germany
International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)
25.03.2019
10.1145/3301418.3313943
1
SebastianGallenmüller
RenéGlebke
StephanGünther
EricHauser
MauriceLeclaire
StefanReif
JanRüth
AndreasSchmidt
GeorgCarle
ThorstenHerfet
WolfgangSchröder-Preikschat
KlausWehrle
inproceedings
2019-glebke-hicss-integrated
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
2019
1
8
7252-7261
internet-of-production,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-integrated.pdf
Online
University of Hawai'i at Manoa / AIS
Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), Wailea, HI, USA
en
978-0-9981331-2-6
10.24251/HICSS.2019.871
1
RenéGlebke
MartinHenze
KlausWehrle
PhilippNiemietz
DanielTrauth
PatrickMattfeld
ThomasBergs
inproceedings
2018-tzimmermann-toplists
A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists
2018
10
31
maki
https://dl.acm.org/citation.cfm?id=3278574
https://arxiv.org/abs/1805.11506
ACM
Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278574
1
QuirinScheitle
OliverHohlfeld
JulienGamba
JonasJelten
TorstenZimmermann
Stephen D.Strowes
NarseoVallina-Rodriguez
inproceedings
2018-rueth-reflexnetcompute
Towards In-Network Industrial Feedback Control
2018
8
20
reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexnetcompute.pdf
ACM
Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18)
Budapest, Hungary
ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute 2018)
20.08.2018
10.1145/3229591.3229592
1
JanRüth
RenéGlebke
KlausWehrle
VedadCausevic
SandraHirche
article
2018-serror-tvt-fb
Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks
IEEE Transactions on Vehicular Technology
2018
7
67
7
5778-5792
koi
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-tvt-fbl-performance.pdf
IEEE
online
0018-9545
10.1109/TVT.2018.2794178
1
YulinHu
MartinSerror
KlausWehrle
JamesGross
inproceedings
2018-serror-wowmom-relaying
Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency
2018
6
11
iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-wowmom-relaying.pdf
IEEE
online
19th IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (IEEE WoWMoM 2018), Chania, Greece
Chania, Crete, Greece
WoWMoM
June 12-15, 2018
978-1-5386-4725-7
10.1109/WoWMoM.2018.8449807
1
MartinSerror
SebastianVaaßen
KlausWehrle
JamesGross
inproceedings
2018-rueth-reflexdemo
Demo: Towards In-Network Processing for Low-Latency Industrial Control
2018
4
15
reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexdemo.pdf
IEEE Computer Society
In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications
Honolulu, HI, USA
International Conference on Computer Communications (INFOCOM)
15.04.2018 - 19.04.2018
en
10.1109/INFCOMW.2018.8406844
1
JanRüth
RenéGlebke
TanjaUlmen
KlausWehrle
inproceedings
2018-cpsbench-schemmel-equiv
Towards Benchmark Optimization by Automated Equivalence Detection
2018
4
10
symbiosys,reflexes
file:2196
Proceedings of the 1st Workshop on Benchmarking Cyber-Physical Networks and Systems (CPSBench'18)
Porto, Portugal
1st Workshop on Benchmarking Cyber-Physical Networks and Systems
2018-04-10
978-1-5386-6742-2
10.1109/CPSBench.2018.00011
1
DanielSchemmel
RenéGlebke
MirkoStoffers
KlausWehrle
article
2018-scheitle-ccr-caa
A First Look at Certification Authority Authorization (CAA)
ACM SIGCOMM Computer Communications Review (CCR)
2018
4
48
10-23
https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf
internet-measurements
https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf
https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/
2018-06-05
10.1145/3213232.3213235
1
QuirinScheitle
TaejoongChung
JensHiller
OliverGasser
JohannesNaab
Rolandvan Rijswijk-Deij
OliverHohlfeld
RalphHolz
DaveChoffnes
AlanMislove
GeorgCarle
article
2016-fgcs-ziegeldorf-bitcoin
Secure and anonymous decentralized Bitcoin mixing
Future Generation Computer Systems
2018
3
80
448-466
Pseudonymity, anonymity, and untraceability
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-ziegeldorf-fgcs-bitcoin.pdf
Online
Elsevier
en
0167-739X
10.1016/j.future.2016.05.018
1
Jan HenrikZiegeldorf
RomanMatzutt
MartinHenze
FredGrossmann
KlausWehrle
article
dombrowski-vdi
Funktechnologien für Industrie 4.0
VDE Positionspapier
2017
6
1
VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.
Stresemannallee 15, 60596 Frankfurt am Main, Germany
IsmetAktas
AlexanderBentkus
FlorianBonanati
ArminDekorsy
ChristianDombrowski
MichaelDoubrava
AliGolestani
FrankHofmann
MikeHeidrich
StefanHiensch
RüdigerKays
MichaelMeyer
AndreasMüller
Stephanten Brink
NedaPetreska
MilanPopovic
LutzRauchhaupt
AhmadSaad
HansSchotten
ChristophWöste
IngoWolff
inproceedings
2017-serror-pads-cows
Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping
2017
5
24
memosim,symbiosys
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-pads-cows.pdf
ACM
online
Proceedings of the 5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17), Singapore, Singapore
Singapore, Singapore
5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17)
May 24-26, 2017
978-1-4503-4489-0
10.1145/3064911.3064913
1
MartinSerror
Jörg ChristianKirchhof
MirkoStoffers
KlausWehrle
JamesGross
inproceedings
2017-serror-ew-koi
From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication
2017
5
17
koi
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-radio-design-ew17.pdf
IEEE
Proc. of 23rd European Wireless Conference (EW17), Dresden, Germany
Dresden, Germany
Proc. of 23rd European Wireless Conference (EW17)
17.-19. May 2017
1
Shehzad AliAshraf
Y.-P. EricWang
SamehEldessoki
BerndHolfeld
DonaldParruca
MartinSerror
JamesGross
proceedings
2017-serror-netsys-industrial
Demo: A Realistic Use-case for Wireless Industrial Automation and Control
2017
3
16
koi
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/Ansari_et_al_Wireless_Industrial_Automation_Demo_NetSys_2017.pdf
IEEE
Göttingen, Germany
International Conference on Networked Systems (NetSys 2017)
10.1109/NetSys.2017.7931496
1
JunaidAnsari
IsmetAktas
ChristianBrecher
ChristophPallasch
NicolaiHoffmann
MarkusObdenbusch
MartinSerror
KlausWehrle
JamesGross
inproceedings
2017-matzutt-mynedata
myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data
2017
1073-1084
Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.
Presentation slides are in German
Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling
mynedata_show
https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf
https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf
Presentation slides
Eibl, Maximilian and Gaedke, Martin
Gesellschaft für Informatik, Bonn
INFORMATIK 2017
Chemnitz
INFORMATIK 2017
2017-09-28
English
978-3-88579-669-5
1617-5468
10.18420/in2017_109
1
RomanMatzutt
DirkMüllmann
Eva-MariaZeissig
ChristianeHorst
KaiKasugai
SeanLidynia
SimonWieninger
Jan HenrikZiegeldorf
GerhardGudergan
IndraSpiecker gen. Döhmann
KlausWehrle
MartinaZiefle
inproceedings
DombrowskiSRDS16
Model-Checking Assisted Protocol Design for Ultra-reliable Low-Latency Wireless Networks
2016
9
27
307--316
fault tolerance;formal verification;protocols;wireless channels;EchoRing protocol;fault-tolerant methods;formal model-based verification;model-checking assisted protocol;probabilistic model checking;reliability constraints;safety-critical industrial applications;salient features;token loss;token-based system;ultrareliable low-latency wireless networks;unprecedented latency;wireless networking community;wireless protocols;wireless token-passing systems;Automata;Model checking;Payloads;Probabilistic logic;Protocols;Reliability;Wireless communication;Model checking;Probabilistic timed automata;Token passing;Wireless Industrial Networks;tool-assisted protocol design;validation
cps,hodrian
http://ieeexplore.ieee.org/document/7794360/
Proc. of IEEE 35th Symposium on Reliable Distributed Systems
IEEE
Budapest, Hungary
IEEE 35th Symposium on Reliable Distributed Systems (SRDS)
10.1109/SRDS.2016.048
1
ChristianDombrowski
SebastianJunges
Joost-PieterKatoen
JamesGross
conference
2016-hohlfeld-qcman
Insensitivity to Network Delay: Minecraft Gaming Experience of Casual Gamers
2016
9
Assessing the impact of network delay on perceived quality of gaming has been subject to many studies involving different genres ranging from fast-paced first-person shooters to strategy games. This paper assesses the impact of network latency on the Quality of Experience (QoE) of casual gamers playing Minecraft. It is based on a user study involving 12 casual gamers with no prior experience with Minecraft. QoE is assessed using the Game Experience Questionnaire (GEQ) and dedicated questions for the overall perceived quality and experienced gameplay interruptions. The main finding is that casual Minecraft players are rather insensitive to network delay of up to 1 sec.
https://i-teletraffic.org/_Resources/Persistent/bc99ba4324ebc7cf1369f09a6caa334c0203943f/Hohlfeld2016.pdf
http://ieeexplore.ieee.org/abstract/document/7810715/?reload=true
IEEE QCMan
IEEE QCMan
10.1109/ITC-28.2016.313
OliverHohlfeld
HannesFiedler
EnricPujol
DennisGuse
inproceedings
2016-serror-wowmom-arq
Performance Analysis of Cooperative ARQ Systems for Wireless Industrial
Networks
2016
6
21
koi
IEEE
online
17th IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks (IEEE WoWMoM 2016), Coimbra, Portugal
Coimbra, Portugal
en
10.1109/WoWMoM.2016.7523534
1
MartinSerror
YulinHu
ChristianDombrowski
KlausWehrle
JamesGross
article
2016-kunz-tomacs-horizon
Parallel Expanded Event Simulation of Tightly Coupled Systems
ACM Transactions on Modeling and Computer Simulation (TOMACS)
2016
1
26
2
12:1--12:26
The technical evolution of wireless communication technology and the need for accurately modeling these increasingly complex systems causes a steady growth in the complexity of simulation models. At the same time, multi-core systems have become the de facto standard hardware platform. Unfortunately, wireless systems pose a particular challenge for parallel execution due to a tight coupling of network entities in space and time. Moreover, model developers are often domain experts with no in-depth understanding of parallel and distributed simulation. In combination, both aspects severely limit the performance and the efficiency of existing parallelization techniques.
We address these challenges by presenting parallel expanded event simulation, a novel modeling paradigm that extends discrete events with durations which span a period in simulated time. The resulting expanded events form the basis for a conservative synchronization scheme that considers overlapping expanded events eligible for parallel processing. We furthermore put these concepts into practice by implementing Horizon, a parallel expanded event simulation framework specifically tailored to the characteristics of multi-core systems. Our evaluation shows that Horizon achieves considerable speedups in synthetic as well as real-world simulation models and considerably outperforms the current state-of-the-art in distributed simulation.
Parallel discrete event simulation, Multi-core Systems, Wireless Systems, Simulation Modeling Paradigm, Conservative Synchronization
horizon
ACM
en
10.1145/2832909
1
GeorgKunz
MirkoStoffers
OlafLandsiedel
KlausWehrle
JamesGross
inproceedings
2015-serror-channel-coding
Channel Coding Versus Cooperative ARQ: Reducing Outage Probability in
Ultra-Low Latency Wireless Communications
2015
12
koi
file:1704
IEEE
online
IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in
Wireless Communications (GC'15 - ULTRA2), San Diego, USA
San Diego, USA
IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications
December 6-10 2015
10.1109/GLOCOMW.2015.7414150
1
MartinSerror
ChristianDombrowski
KlausWehrle
JamesGross
inproceedings
2015-stoffers-mswim-data-deps
Data Dependency based Parallel Simulation of Wireless Networks
2015
11
2
291-300
Simulation of wireless systems is highly complex and can only be efficient if the simulation is executed in parallel. To this end, independent events have to be identified to enable their simultaneous execution. Hence, the number of events identified as independent needs to be maximized in order to increase the level of parallelism. Traditionally, dependencies are determined only by time and location of events: If two events take place on the same simulation entity, they must be simulated in timestamp order. Our approach to overcome this limitation is to also investigate data-dependencies between events. This enables event reordering and parallelization even for events at the same simulation entity. To this end, we design the simulation language PSimLa, which aids this process. In this paper, we discuss the PSimLa design and compiler as well as our data-dependency analysis approach in detail and present case studies of wireless network models, speeded up by a factor of 10 on 12 cores where time-based parallelization only achieves a 1.6x speedup.
Best Paper Award
Parallel simulation; Static code analysis; Data dependencies
horizon
http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-mswim-data-deps.pdf
Online
ACM
New York, NY
Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Cancún, Mexico (MSWiM'15)
Cancún, Mexico
en
10.1145/2811587.2811593
1
MirkoStoffers
TorstenSehy
JamesGross
KlausWehrle
poster
serror-zdn-2015
How to Benefit from Cooperation in Latency-Constrained Wireless Communications
2015
9
25
cps,koi,hodrian
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-serror-zdn-cooperation.pdf
http://kn.inf.uni-tuebingen.de/itg-zdn-2015-poster-session
VDE
online
ITG-Fachtagung "Zukunft der Netze 2015" – Poster Session, Tübingen, Germany
Tübingen, Germany
MartinSerror
ChristianDombrowski
KlausWehrle
JamesGross
inproceedings
2015-gerdes-authorization
Autorisierungsmanagement für das Internet of Things
2015
9
iotsec
Online
D•A•CH Security 2015
Sankt Augustin, Germany
D•A•CH Security 2015
08.09. - 09.09.2015
accepted
de
1
StefanieGerdes
RenéHummen
OlafBergmann
inproceedings
2015-schmidt-santa
Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]
2015
8
19
ssiclops
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf
Online
ACM
Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom
London, United Kingdom
43rd ACM SIGCOMM Conference (SIGCOMM '15)
17–21 August, 2015
en
10.1145/2785956.2790014
1
FlorianSchmidt
OliverHohlfeld
RenéGlebke
KlausWehrle
inproceedings
2015-wowmom-schumacher-warpsim
WARPsim: A Code-Transparent Network Simulator for WARP Devices
2015
6
14
cps,koi
file:1688
IEEE
online
16th IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks: Demos (IEEE WoWMoM 2015 - Demos), Boston, USA
Boston, USA
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
14.-17. June 2015
10.1109/WoWMoM.2015.7158181
1
AndreasSchumacher
MartinSerror
ChristianDombrowski
JamesGross
inproceedings
2015-stoffers-pads-data-deps
Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation
2015
6
10
73-74
horizon
http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-pads-data-deps.pdf
Online
ACM
New York, NY
Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom
London, United Kingdom
en
10.1145/2769458.2769487
1
MirkoStoffers
TorstenSehy
JamesGross
KlausWehrle
inproceedings
Dombrowski2015EW
EchoRing: A Low-Latency, Reliable Token-Passing MAC Protocol for Wireless Industrial Networks
2015
5
20
Spurred by recent industrial trends, such as factory automation or phase synchronization in the smart grid, there is a significant interest for wireless industrial networks lately. In contrast to traditional applications, the focus is on carrying out communication at very short latencies together with high reliabilities. Meeting such extreme requirements with wireless networks is challenging. A potential candidate for such a network is a token-passing protocol, as it allows to bound latencies. However, it lacks mechanisms to cope with the dynamics of wireless channels. In this paper, we present EchoRing, a novel wireless token-passing protocol. Cooperative communication and an improved fault tolerance allow this decentralized protocol to support industrial applications over wireless networks. Based on experimental results, we demonstrate the suitability of EchoRing to support demands of industrial applications. EchoRing outperforms other schemes by several orders of magnitude in terms of reliability for latencies of and below 10ms.
Protocols and architectures for wireless networks; Testbeds and experimental wireless systems; Reliability: robust and dependable wireless systems
cps,hodrian
IEEE
Proc. of 21st European Wireless Conference (EW15)
Budapest, Hungary
European Wireless Conference (EW)
20/05/2015
978-3-8007-3976-9
ChristianDombrowski
JamesGross
inproceedings
virtualcoordinate_li_lin_stoffers_gross_2015
Channel-Aware Virtual Coordinates Assignment Protocol and Routing in Multi-Hop Cognitive Radio Network
2015
5
20
http://dl.ifip.org/db/conf/networking/networking2015/1570067591.pdf
Online
IFIP
Laxenburg, Austria
Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France
Toulouse, France
en
10.1109/IFIPNetworking.2015.7145337
1
DiLi
ZhichaoLin
MirkoStoffers
JamesGross
inproceedings
Dombrowski2015NetSys
EchoRing: Meeting Hard Real-Time Constraints with Decentralized Wireless Networks
2015
3
9
1--3
cps,hodrian
http://www.netsys2015.com/wp-content/uploads/NetSys2015_Demo_Dombrowski.pdf
http://www.netsys2015.com/program/demonstrations/
http://www.netsys2015.com/communication-software-awards/
2nd Place Regular Demonstrations
IEEE
Proc. of 2nd International Conference on Networked Systems, Demonstrations (NetSys15)
Cottbus, Germany
Conference on Networked Systems (NetSys) - Demo Session
09/03/2015
1
ChristianDombrowski
JamesGross
inproceedings
2014-ziegeldorf-codaspy-coinparty
CoinParty: Secure Multi-Party Mixing of Bitcoins
2015
3
2
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf
Online
ACM
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
San Antonio, TX, USA
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015)
en
978-1-4503-3191-3
10.1145/2699026.2699100
1
Jan HenrikZiegeldorf
FredGrossmann
MartinHenze
NicolasInden
KlausWehrle
conference
Schumacher2014
A Code-transparent MAC Simulator for WARP
2014
11
19
hodrian,cps
Proc. of European workshop on testbed based wireless research
Stockholm, Sweden
European workshop on testbed based wireless research
19/11/2014
AndreasSchumacher
ChristianDombrowski
JamesGross
conference
parruca_2014ICIC
Semi-Static Interference Coordination in OFDMA/LTE Networks: Evaluation of Practical Aspects
2014
9
21
To minimize interference in LTE networks, several inter-cell
interference coordination (ICIC) techniques have been in-
troduced. Among them, semi-static ICIC offers a balanced
trade-off between applicability and system performance. The
power allocation per resource block and cell is adapted in
the range of seconds according to the load in the system.
An open issue in the literature is the question how fast the
adaptation should be performed. This leads basically to a
trade-off between system performance and feasible compu-
tation times of the associated power allocation problems. In
this work, we close this open issue by studying the impact
that different durations of update times of semi-static ICIC
have on the system performance. We conduct our study
on realistic scenarios considering also the mobility of mobile terminals. Secondly, we also consider the implementation aspects of a semi-static ICIC. We introduce a very efficient implementation on general purpose graphic processing units, harnessing the parallel computing capability of such devices. We show that the update periods have a significant impact on the performance of cell edge terminals. Additionally, we present a graphic processing unit (GPU) based implementation which speeds up existing implementations up to a factor of 92x.
OFDMA; LTE; ICIC; Inter-Cell Interference Coordination;
GPU; GA; Genetic Algorithm; 4G; Cellular Networks; In-
terference; Proportional Fair Scheduling
ACM
ACM
Proceedings of the 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM-14)
Montreal, QC, Canada
International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM-14)
September 21-26 2014
http://dx.doi.org/10.1145/2641798.2641818
1
DonaldParruca
FahadAizaz
SoamsiriChantaraskul
JamesGross
inproceedings
2014-stoffers-omnet-parallel-inet
Enabling Distributed Simulation of OMNeT++ INET Models
2014
9
3
http://arxiv.org/pdf/1409.0994
arXiv:1409.0994
Online
Cornell University
Ithaca, New York, United States
Proceedings of the 1st OMNeT++ Community Summit, Hamburg, Germany
Hamburg, Germany
en
MirkoStoffers
RalfBettermann
JamesGross
KlausWehrle
inproceedings
2014-wowmom-wirtz-sofi
Pervasive Content-centric Wireless Networking
2014
6
18
fileadmin/papers/2014/2014-wirtz-wowmom-sofi.pdf
online
IEEE
15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
Sydney, Australia
WoWMoM
June, 2014
en
10.1109/WoWMoM.2014.6918968
1
HannoWirtz
MatteoCeriotti
BenjaminGrap
KlausWehrle
inproceedings
2014-aktas-punal-wowmom-machine-learning-based-jamming-detection-for-80211-conference
Machine Learning-based Jamming Detection for IEEE 802.11: Design and Experimental Evaluation
Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
2014
6
16
1--10
crawler
fileadmin/papers/2014/2014-aktas-wowmom-jammingdetection.pdf
Online
IEEE
Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
Sydney
15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14)
16-19 June, 2014
en
1
OscarPuñal
IsmetAktas
Caj-JulianSchnelke
GloriaAbidin
JamesGross
KlausWehrle
article
parruca2014icc
On the Interference As Noise Approximation in OFDMA/LTE Networks
Proceedings of IEEE International Conference on Communications (ICC 2014)
2014
6
11
fileadmin/papers/2014/2014_parruca_gross.pdf
Online
en
1
DonaldParruca
JamesGross
inproceedings
2014-stoffers-simutools-distributed-horizon
Large-Scale Network Simulation: Leveraging the Strengths of Modern SMP-based Compute Clusters
2014
3
17
31-40
horizon
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-stoffers-simutools-distributed-horizon.pdf
Online
ICST
Brussels, Belgium
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SIMUTools'14), Lisbon, Portugal
Lisbon, Portugal
en
978-1-63190-007-5
10.4108/icst.simutools.2014.254622
1
MirkoStoffers
SaschaSchmerling
GeorgKunz
JamesGross
KlausWehrle
inproceedings
2013-cloudcom-henze-cloud-data-handling
Towards Data Handling Requirements-aware Cloud Computing (Poster Abstract)
2013
12
2
266-269
ipacs
fileadmin/papers/2013/2013-cloudcom-henze-cloud-data-handling.pdf
Online
IEEE
Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK
Bristol, UK
2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013)
en
978-0-7695-5095-4
10.1109/CloudCom.2013.145
1
MartinHenze
MarcelGroßfengels
MaikKoprowski
KlausWehrle
techreport
2013-draft-hummen-dtls-extended-session-resumption-01
Extended DTLS Session Resumption for Constrained Network Environments
2013
10
18
draft-hummen-dtls-extended-session-resumption-01
This draft defines two extensions for the existing session resumption
mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in
constrained network environments. Session resumption type
negotiation enables the client and the server to explicitly agree on
the session resumption mechanism for subsequent handshakes, thus
avoiding unnecessary overheads occurring with the existing
specifications. Session resumption without client-side state
additionally enables a constrained DTLS client to resume a session
without the need to maintain state while the session is inactive.
The extensions defined in this draft update [RFC5077] and [RFC5246].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
JohannesGilger
HosseinShafagh
techreport
2013-draft-garcia-core-security-06
Security Considerations in the IP-based Internet of Things
2013
9
11
draft-garcia-core-security-06
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-06
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
conference
VTC2013_parruca_gross
Analytical Model of Proportional Fair Scheduling in Interference-limited OFDMA/LTE Networks
2013
9
Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_VTC_parruca.pdf
Proceedings of IEE Vehicular Telecommunications Conference (VTC-Fall 2013)
Las Vegas, USA
2013 IEEE 78th Vehicular Technology Conference
2-5, September, 2013
DonaldParruca
MariusGrysla
SimonGörtzen
JamesGross
techreport
draft-hummen-dtls-extended-session-resumption-00
Extended DTLS Session Resumption for Constrained Network Environments
2013
7
15
draft-hummen-dtls-extended-session-resumption-00
This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-00
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
JohannesGilger
article
2013-scn-ziegeldorf-iot-privacy
Privacy in the Internet of Things: Threats and Challenges
Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World'
2013
6
10
http://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-ziegeldorf-scn-privacy-in-the-iot.pdf
Online
Wiley
en
10.1002/sec.795
1
Jan HenrikZiegeldorf
OscarGarcia-Morchon
KlausWehrle
conference
2013-wowmom-punal-RFRA
RFRA: Random Forests Rate Adaptation for Vehicular Networks
2013
6
4
IEEE
Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)
Madrid, Spain
WoWMoM
June, 2013
accepted
OscarPuñal
HanzhiZhang
JamesGross
inproceedings
Dombrowski2013WiOpt
Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications
2013
5
13
341-348
energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi
11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013)
Tsukuba Science City, Japan
English
1
ChristianDombrowski
NedaPetreska
SimonGörtzen
AnkeSchmeink
JamesGross
inproceedings
2013-EW-Weyres-Interference
Effective Service Capacity Analysis of Interference-Limited Multi-Carrier Wireless Systems
19th European Wireless Conference
2013
4
1--7
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6582799
VDE-Verlag
19th European Wireless Conference (EW 2013)
978-3-8007-3498-6
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6582799
1
MarcoWeyres
JamesGross
inproceedings
2013-wisec-garcia-securing
Securing the IP-based Internet of Things with HIP and DTLS
2013
4
119--124
ACM
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)
978-1-4503-1998-0
10.1145/2462096.2462117
1
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
PedroMoreno-Sanchez
FranciscoVidal-Meca
Jan HenrikZiegeldorf
inproceedings
2013-pitsac-vidalmeca-hip
HIP security architecture for the IP-based Internet of Things
2013
3
25
1331 - 1336
The IP-based Internet of Things refers to the
pervasive interactions of smart objects and people enabling
new applications by means of IP protocols. An application
scenario is a Smart City in which the city infrastructure,
cars, and people exchange information to enable new services.
IP protocols, such as IPv6, TCP and HTTP will be further
complemented by IPv6 over Low powerWireless Personal Area
Networks and Constrained Application Protocol currently in
development in IETF. Security and privacy are a must for
the IP-based IoTs in order to ensure its acceptance. However,
mobility, limited bandwidth, and resource-constrained devices
pose new challenges and require for a sound and efficient
security architecture. In particular, dynamic association of
mobile smart objects and the management of keys in large-scale
networks remain an open challenge. In this context, we propose
a flexible security architecture based on the Host Identity
Protocol and Multimedia Internet KEYing protocols allowing
for secure network association and key management. HIP -
based on asymmetric-key cryptography - ensures unambiguous
thing identification, mobility support, as well as a lightweight
and secure method for network association. In our solution,
HIP is extended with MIKEY capabilities to provide enhanced
key management using polynomials, which allow to generate
pairwise keys with any node based on its identity. This
combination of protocols and crypto-algorithms ensures both
strong security and very good performance as shown by our
implementation and presents clear advantages compared with
other alternatives.
Internet of Things; Security; Network Access; Key Management
Online
IEEE
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013
Barcelona, Spain
25.-28.03.2013
en
10.1109/WAINA.2013.158
1
FranciscoVidal Meca
Jan HenrikZiegeldorf
OscarGarcia-Morchon
Sandeep S.Kumar
Sye LoongKeoh
PedroMoreno-Sanchez
techreport
2013-draft-garcia-core-security-05
Security Considerations in the IP-based Internet of Things
2013
3
11
draft-garcia-core-security-05
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-05
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
proceedings
parruca_gross_2013
Rate selection analysis under semi-persistent scheduling in LTE networks
2013
1
25
1184,1190
Upcoming LTE networks have basically two different modes for scheduling data in the down-link by the base station. Dynamic scheduling brings the advantage of exploiting instantaneous channel state information while it puts on the other hand a significant burden on the system in terms of overhead and computation requirements. Especially for small packets that show up periodically, the overhead is typically too high. Therefore, the base station can serve such packet flows by the semi-persistent scheduling mode. In this mode, a certain resource allocation is fixed to a periodic schedule. While this does not allow any longer to exploit instantaneous channel states, it requires much less overhead. In this paper, we address the problem of selecting a modulation and coding scheme for such semi-persistent scheduling grants. The problem lies here in the stochastic characterization of the resource blocks over the next few seconds while on the other hand estimating based on such a characterization the blok error rate (and hence the average goodput). We provide a novel scheme, which outperforms all previously presented schemes significantly. The underlying model that we provide can also be used for any other long-term decision in an LTE system with semi-persistent scheduling such as interference coordination, handover decision etc.
Long Term Evolution;decision making;dynamic scheduling;error statistics;modulation;radio links;resource allocation;stochastic processes;wireless channels;LTE networks;base station;blok error rate;data scheduling;down-link;dynamic scheduling;instantaneous channel state information;long-term decision;modulation selection;packet flows;periodic scheduling;rate selection analysis;resource allocation;resource blocks;semi-persistent scheduling mode;stochastic characterization
www.performance.rwth-aachen.de/publications/conferences/2013ICNC_parruca.pdf
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6504261
San Diego, USA
International Conference on Computing, Networking and Communications (ICNC) 2013
28-31 January 2013
English
978-1-4673-5287-1
10.1109/ICCNC.2013.6504261
DonaldParruca
JamesGross
inbook
2013-book-weingaertner-benchmarking-p2p
Benchmarking Peer-to-Peer Systems
Understanding Quality of Service in Large-Scale Distributed Systems
2013
7847
69-79
http://link.springer.com/chapter/10.1007/978-3-642-38673-2_5
2016-11-11
Print
Effelsberg, Wolfgang and Steinmetz, Ralf and Strufe, Thorsten
Springer
Lecture Notes in Computer Science
Content Delivery Overlays
EN
978-3-642-38672-5
10.1007/978-3-642-38673-2_5
EliasWeingaertner
RenéGlebke
AlexanderHocks
conference
EW2013_parruca_gross
On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
2013
8
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models.
ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf
http://www.vde-verlag.de/proceedings-en/563498043.html
vde-verlag
vde-verlag
http://www.vde-verlag.de/
Proceedings: European Wireless 2013
Guildford, UK
2013 - 19th European Wireless Conference
04/16/2012 - 04/18/2013
English
DonaldParruca
MariusGrysla
PetriMähönen
MarinaPetrova
HanZhou
FarshadNaghibi
JamesGross
inproceedings
2013_Jakobs_SIIT1
How to Perceive the (Future) Role of China in ICT Standardisation – A European Perspective. Proc. 8th Int. Conf. on Standardisation & Innovation in Information Technology
2013
fileadmin/papers/2013/2013_Jakobs_SIIT1.pdf
Proc. 8th Int. Conf. on Standardisation & Innovation in Information Technology
1
KaiJakobs
MartinaGerst
inproceedings
2012-IPIN-Bitsch-FlowPath
Indoor Navigation on Wheels (and on Foot) using Smartphones
2012
11
13
10 S.
fileadmin/papers/2012/2012-bitsch-IPIN-navigation-on-wheels.pdf
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6418931
Print
Piscataway, NJ, USA
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 11-13 November 2012 Sydney, Australia
IEEE
Sydney, Australia
2012 International Conference on Indoor Positioning and Indoor Navigation
November 13--15, 2012
en
978-1-4673-1955-3
10.1109/IPIN.2012.6418931
1
Jó AgilaBitsch Link
FelixGerdsmeier
PaulSmith
KlausWehrle
inproceedings
2012-Q2SWinet-Gross-Noise
Effective Service Capacity Analysis of Opportunistic Multi-Carrier OFDMA Systems
2012
10
17--26
ACM
Proc. of the ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2012)
en
978-1-4503-1619-4
10.1145/2387218.2387222
1
JamesGross
MarcoWeyres
AdamWolisz
inproceedings
2012-pimrc-schmidt-ofra
A Receiver-Based 802.11 Rate Adaptation Scheme with On-Demand Feedback
2012
9
10
1--7
Classical 802.11 rate adaptation algorithms rely on feedback from the receiver to correctly choose a sending rate, typically in the form of acknowledgments (ACKs). In the absence of such frames, novel techniques are required for rate selection.
We present OFRA, a receiver-based rate adaptation algorithm that works with ACK-less traffic. Feedback information is sent on-demand using a control frame to explicitly inform the transmitter about which bit rate to use on subsequent data frames. This approach guarantees standard conformity and exhibits fast and accurate bit rate adaptation at the cost of a modest overhead increase. We evaluate the performance of OFRA against various state-of-the-art rate adaptation schemes by means of simulations. If ACK frames are to be transmitted, OFRA performs better than related work in most considered scenarios, and on par in the others. In the absence of ACKs, OFRA provides large goodput gains under good channel conditions and comparable goodput in other situations.
OFRA
refector
fileadmin/papers/2012/2012-schmidt-pimrc-ofra.pdf
Online
IEEE
Proceedings of the 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12), Sydney, Australia
Sydney, Australia
23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12)
9-12 September 2012
en
978-1-4673-2566-0
2166-9570
10.1109/PIMRC.2012.6362818
1
FlorianSchmidt
AnwarHithnawi
OscarPuñal
JamesGross
KlausWehrle
inproceedings
2012-mobicom-wirtz-sofi
Demo: On-demand Content-centric Wireless Networking
2012
8
451-454
Online
ACM
New York, NY, USA
Proceedings of the 18th ACM Annual International Conference on Mobile Computing and Networking (MobiCom'12), Istanbul, Turkey
Istanbul, Turkey
18th ACM Annual International Conference on Mobile Computing and Networking
22-26 August 2012
en
978-1-4503-1159-5
10.1145/2348543.2348608
1
HannoWirtz
DavidMartin
BenjaminGrap
KlausWehrle
inproceedings
2012-kunz-pads-gpu
Multi-level Parallelism for Time- and Cost-efficient Parallel Discrete Event Simulation on GPUs
2012
7
20
23--32
horizon
https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-pads-gpu.pdf
Print
IEEE
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China
en
978-0-7695-4714-5
1087-4097
10.1109/PADS.2012.27
1
GeorgKunz
DanielSchemmel
JamesGross
KlausWehrle
inproceedings
2012-AIS-Gerst-vehicles
Electric Vehicles and Standardization Management – The Case of a Sino-German Cooperation
2012
6
8
Proc. of the Annual Conference of the Academy of Innovation and Entrepreneurship (AIS).
MartinaGerst
KaiJakobs
GaoXudong
inproceedings
2012-EURAS-Gerst-Mobility
Standardisation Management in Electric Mobility
2012
6
fileadmin/papers/2012/2012-EURAS-Gerst-Mobility.pdf
Print
Marta Orviska; Kai Jakobs
Mainz
17th EURAS Aannual Conference, 2012, Kosice, Slowakia
EN
978-3-86130-337-4
1
MartinaGerst
KaiJakobs
conference
2012-wns3-weingaertner-glebke-vodsim
Building a modular BitTorrent model for ns-3
2012
3
26
373-344
Over the past decade BitTorrent has established itself as the virtual standard for P2P file sharing in the Internet. However, it is currently not possible to investigate BitTorrent with ns-3 due to the unavailability of an according application model. In this paper we eliminate this burden. We present a highly modular BitTorrent model which allows for the easy simulation of different BitTorrent systems such as file sharing as well as present and future BitTorrent-based Video-on-Demand systems.
Best Paper Award, Best Student Paper Award
http://dl.acm.org/citation.cfm?id=2263019.2263073
ICST
Brussels, Belgium
Proceedings of the 2012 workshop on ns-3 (WNS3 2012), 26 March 2012, Desenzano del Garda, Italy
Desenzano del Garda, Italy
Proceedings of the 2012 workshop on ns-3 (WNS3 2012)
978-1-4503-1510-4
1
EliasWeingaertner
RenéGlebke
MartinLang
KlausWehrle
techreport
2012-draft-garcia-core-security
Security Considerations in the IP-based Internet of Things
2012
3
26
draft-garcia-core-security-04
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-04
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
poster
2012-kunz-omnetpp-sequencechart
Poster Abstract: Extending the OMNeT++ Sequence Chart for
Supporting Parallel Simulations in Horizon
2012
3
23
5th International Workshop on OMNeT++ (OMNeT++'12), Desenzano del Garda, Italy
horizon
https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-omnetpp-sequencechart.pdf
Online
ICST
5th International Workshop on OMNeT++ (OMNeT++'12), Desezano del Garda, Italy
en
1
GeorgKunz
SimonTenbusch
JamesGross
KlausWehrle
inproceedings
2012-kunz-simutools-probabilistic-sync
Know Thy Simulation Model: Analyzing Event Interactions for Probabilistic Synchronization in Parallel Simulations
2012
3
20
119-128
horizon
https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-simutools-prob-synch.pdf
Online
ICST
Brussels, Belgium
Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques (SIMUTools'12), Desenzano del Garda, Italy
Desenzano, Italy
en
978-1-4503-1510-4
10.4108/icst.simutools.2012.247716
1
GeorgKunz
MirkoStoffers
JamesGross
KlausWehrle
inproceedings
2012-extremecom-goliath-adama
A Versatile Architecture for DTN Services (Demo)
2012
3
10
1--2
In this demo we present our architecture for delivering ap-
plication services via Disruption or Delay Tolerant Networks
(DTNs). The search for a killer application is still ongoing.
Our architecture enables the community to quickly proto-
type new services and test them in the real world, outside
of simulators. Common tasks such as data transportation
through the network is handled by the framework but can
still be in
uenced by the service, if required. A robust plu-
gin architecture allows to deploy new applications and rout-
ing schemes without aecting stable-running services on the
same network, even if the source of the new plugin is un-
trusted.
Demo Abstract
http://extremecom2012.ee.ethz.ch/papers/7-extremecom2012-Goliath.pdf
Online
Hui, Pan and Lindgren, Anders
ETH Zurich
Zurich, Switzerland
Proceedings of the 4th Extreme Conference on Communication
Zurich Switzerland
4th Extreme Conference on Communication
March 10-14, 2012
en
1
AndréGoliath
Jó AgilaBitsch Link
KlausWehrle
inproceedings
Punal12_Jamming
<prt>In VANETs We Trust?: Characterizing RF Jamming in Vehicular Networks</prt>
2012
83--92
ACM
Proc. of the 9th ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications (VANET'12)
OscarPuñal
AnaAguiar
JamesGross
inproceedings
Punal12_PowerLoading
<prt>Power Loading: Candidate for Future WLANs?</prt>
2012
1-4
Proc. of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'12)
OscarPuñal
HumbertoEscudero
JamesGross
inproceedings
Li2012DySPAN
<prt>Distributed TV Spectrum Allocation for Cognitive Cellular Network under Game Theoretical Framework</prt>
2012
Proc. of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN'12)
DiLi
JamesGross
phdthesis
2012-goetz-phdthesis
Supporting Diversity and Evolvability in Communication Protocols
2012
RWTH Aachen University
StefanGötz
inproceedings
Varj1112:Secure
Secure Resolution of <prt>End-Host</prt> Identifiers for Mobile Clients
2011
12
5
Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT
DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution
fileadmin/papers/2011/2011-varjonen-secure.pdf
Online
IEEE
Piscataway, NJ, USA
IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award
accepted
en
978-1-4244-9268-8
1930-529X
1
SamuVarjonen
TobiasHeer
KennethRimey
AndreiGurtov
techreport
2011-draft-garcia-core-security-03
Security Considerations in the IP-based Internet of Things
2011
10
31
draft-garcia-core-security-03
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-03
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
Dombrowski2011LCN
Hard Real-Time Wireless Medium Access in Action: Stop the Guillotine Within a Millisecond!
2011
10
4
1--3
http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_dombrowski.pdf
http://www.ieeelcn.org/prior/LCN36/lcn36demos.html
Proc. of Local Computer Networks Conference, Demonstrations, (LCN'11)
Bonn, Germany
36th IEEE Conference on Local Computer Networks (LCN)
04/10/2011
1
ChristianDombrowski
JamesGross
article
2011-heer-iot-journal
Security Challenges in the IP-based Internet of Things
Springer Wireless Personal Communications Journal
2011
10
61
3
527-542
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.
iotsec
fileadmin/papers/2011/2011-heer-iot-challenges.pdf
Online
Springer
Netherlands
en
0929-6212
10.1007/s11277-011-0385-5
1
TobiasHeer
OscarGarcia-Morchon
RenéHummen
Sye LoongKeoh
Sandeep S.Kumar
KlausWehrle
inproceedings
2011-wintech-alizai-tinywifi
TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers
2011
9
19-27
tinywifi
fileadmin/papers/2011/2010-09-tinywifi-alizai-wintech.pdf
Online
ACM
New York, NY, USA
Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH ), Las Vegas, NV, USA
Las Vegas, NV, USA
The 17th Annual International Conference on Mobile Computing and Networking
September 2011
en
978-1-4503-0867-0
10.1145/2030718.2030725
1
Muhammad HamadAlizai
HannoWirtz
BernhardKirchen
TobiasVaegs
OmprakashGnawali
KlausWehrle
inproceedings
2011-kunz-mascots-performance-prediction
Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations
2011
7
25
359 - 368
horizon
fileadmin/papers/2011/2011-kunz-performance-prediction-mascots.pdf
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'11), Singapore
Singapore
19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
July 25-17, 2011
en
978-1-4577-0468-0
1526-7539
10.1109/MASCOTS.2011.15
1
GeorgKunz
SimonTenbusch
JamesGross
KlausWehrle
techreport
2011-draft-garcia-core-security-02
Security Considerations in the IP-based Internet of Things
2011
7
11
draft-garcia-core-security-02
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-02
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
2011-iscc-alizai-ble
Efficient Online Estimation of Bursty Wireless Links
2011
6
fileadmin/papers/2011/2011-alizai-iscc-ble.pdf
Online
IEEE Computer Society
Los Alamitos, CA, USA
16th IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece
Kerkyra, Greece
en
978-1-4577-0678-3
10.1109/ISCC.2011.5983839
1
Muhammad HamadAlizai
HannoWirtz
GeorgKunz
BenjaminGrap
KlausWehrle
inproceedings
Dombrowski2011RealWIN
Reducing Outage Probability Over Wireless Channels Under Hard Real-time Constraints
2011
4
11
1 -6
Proc. of Workshop on Real-Time Wireless For Industrial Applications (RealWIN'11)
1
ChristianDombrowski
JamesGross
inproceedings
2011-ipsn-alizai-pad
Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks
2011
4
fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf
Online
ACM
New York, NY, USA
Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA
Chicago, IL, USA
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
StefanGötz
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2011-kunz-omnetpp-horizon
Runtime Efficient Event Scheduling in Multi-threaded Network Simulation
2011
3
21
359-366
Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation.
We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \emph{push-based event handling scheme} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \emph{event scheduling algorithm} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.
horizon
fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf
Online
ICST
Brussels, Belgium
Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain
Barcelona, Spain
4th International Workshop on OMNeT++ (OMNeT++'11)
March 21, 2011
en
978-1-936968-00-8
10.4108/icst.simutools.2011.245504
1
GeorgKunz
MirkoStoffers
JamesGross
KlausWehrle
techreport
2011-draft-garcia-core-security-01
Security Considerations in the IP-based Internet of Things
2011
3
14
draft-garcia-core-security-01
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-01
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2011-draft-garcia-core-security-00
Security Considerations in the IP-based Internet of Things
2011
3
7
draft-garcia-core-security-00
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-00
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
PunalScOff11
<prt>Combined Subcarrier Switch Off and Power Loading for 80 MHz Bandwidth WLANs</prt>
2011
Proc. of the 18th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN'11)
OscarPuñal
JamesGross
inproceedings
Punal11
<prt>Performance Comparison of Loading Algorithms for 80 MHz IEEE 802.11 WLANs</prt>
2011
124--132
Proc. of the 73rd IEEE Vehicular Technology Conference (VTC-Spring'11)
OscarPuñal
HumbertoEscudero
JamesGross
inproceedings
Li2011ICC
<prt>Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access</prt>
2011
1 -6
Proc. of IEEE International Conference on Communications (ICC'11)
DiLi
JamesGross
inproceedings
2010-kunz-mascots-horizon
Expanding the Event Horizon in Parallelized Network Simulations
2010
8
18
172-181
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.
horizon
fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA
Miami, FL, USA
18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)
August 17-19, 2010
en
978-0-7695-4197-6
1526-7539
10.1109/MASCOTS.2010.26
1
GeorgKunz
OlafLandsiedel
JamesGross
StefanGötz
FarshadNaghibi
KlausWehrle
inproceedings
2010-heer-pisa-sa
PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing
2010
8
2
1
588-593
With the goal of providing ubiquitous wireless services (e.g., tourist guides, environmental information, pedestrian navigation), municipal wireless networks are currently being established all around the world. For municipalities, it is often challenging to achieve the bandwidth and coverage that is necessary for many of the envisioned network services. At the same time, Wi-Fi-sharing communities achieve high bandwidth and good coverage at a very low cost by capitalizing on the dense deployment of private access points in urban areas. However, from a technical, conceptual, and security perspective, Wi-Fi sharing community networks resemble a patchwork of heterogeneous networks instead of one well-planned city-wide network. This patchwork character stands in stark contrast to a uniform, secure platform for public and commercial services desirable for the economic success of such a network. Hence, despite its cost-efficiency, the community-based approach cannot be adopted by municipalities easily. In this paper, we show how to realize municipal wireless services on top of a Wi-Fi-sharing infrastructure in a technically sound and economically attractive fashion. In particular, we focus on how to securely provide services to mobile clients with and without client-side software support. Our solution cleanly separates the roles of controlling and administering the network from providing bandwidth and wireless access. With this separation, commercial ISPs and citizens with their private Wi-Fi can contribute to the network infrastructure. This allows municipalities in turn to focus their resources on municipal wireless services.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-icc-pisa-sa.pdf
Print
IEEE Press
Washington, DC, USA
International Conference on Computer Communication Networks, ICCCN 2010, Zurich
Zurich, Switzerland
International Conference on Computer Communication Networks, ICCCN 2010
en
978-1-4244-7114-0
10.1109/ICCCN.2010.5560103
1
TobiasHeer
ThomasJansen
RenéHummen
HannoWirtz
StefanGötz
EliasWeingaertner
KlausWehrle
inproceedings
201004IPSNbitschratmote
Demo Abstract: RatMote - A Sensor Platform for Animal Habitat Monitoring
2010
4
12
432--433
In this work, we present RatMote, a new wireless sensor node for subterranean animal habitat monitoring. RatMote has been developed for project RatPack, which aims at creating a new method for behavioral research on rats in their natural environment using wireless sensor nodes. Recent development in microcontroller architecture allowed us to design a sensor node which calculates up to 22 times more operations per mAh than the widely used TelosB node. This significant performance and efficiency increase allows us to perform computationally demanding algorithms inside the node, needed for vocalization analysis, localization, and mapping.
Demo Abstract
RatPack
fileadmin/papers/2010/2010-04-IPSN-bitsch-ratmote.pdf
http://doi.acm.org/10.1145/1791212.1791291
Online
ACM
New York City, NY, USA
IPSN '10
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
ACM
Stockholm, Sweden
9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
April 12-16, 2010
en
978-1-60558-988-6
http://doi.acm.org/10.1145/1791212.1791291
1
Jó AgilaBitsch Link
ThomasBretgeld
AndréGoliath
KlausWehrle
inproceedings
2010-percomws-heer-munifi
Collaborative Municipal Wi-Fi Networks - Challenges and Opportunities
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), IEEE.
2010
4
2
1
588 - 593
Municipal Wi-Fi networks aim at providing Internet access and selected mobile network services to citizens, travelers, and civil servants. The goals of these networks are to bridge the digital divide, stimulate innovation, support economic growth, and increase city operations efficiency. While establishing such urban networks is financially challenging for municipalities, Wi-Fi-sharing communities accomplish good coverage and ubiquitous Internet access by capitalizing on the dense deployment of private access points in urban residential areas. By combining Wi-Fi communities and municipal Wi-Fi, a collaborative municipal Wi-Fi system promises cheap and ubiquitous access to mobile city services. However, the differences in intent, philosophy, and technical realization between community and municipal Wi-Fi networks prevent a straight-forward combination of both approaches. In this paper, we highlight the conceptual and technical challenges that need to be solved to create collaborative municipal Wi-Fi networks.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-percomws-collaborative-municipal-wi-fi.pdf
Print
IEEE Press
Washington, DC, USA
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany.
Mannheim, Germany
Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010)
April 02, 2010
en
978-1-4244-6605-4
10.1109/PERCOMW.2010.5470505
TobiasHeer
RenéHummen
NicolaiViol
HannoWirtz
StefanGötz
KlausWehrle
inproceedings
DBLP:conf/webist/ChristophGK10
Efficient Literature Research based on Semantic Tagnets - Implemented and Evaluated for a German Text-corpus
2010
4
2
48-54
Print
Joaquim Filipe and José Cordeiro
INSTICC Press
WEBIST 2010, Proceedings of the 6th International Conference on Web Information Systems and Technologies, Valencia, Spain
en
978-989-674-025-2
UtaChristoph
DanielGötten
Karl-HeinzKrempels
inbook
2010-02-book-alizai-hardware-and-systems
Tools and Modeling Approaches for Simulating Hardware and Systems
2010
2
1
99-117
http://www.network-simulation.info/
http://www.amazon.com/Modeling-Tools-Network-Simulation-Wehrle/dp/3642123309
Print
Springer LNCS
Chapter 7
Modeling and Tools for Network Simulation
EN
978-3-642-12330-6
Muhammad HamadAlizai
LeiGao
TorstenKempf
OlafLandsiedel
book
2010-kai-euras2
Services Standardisation. Proceedings of the 15th EURAS Conference. EURAS contributions to standardisation research, vol. 2.
2010
print
EURAS
Hamburg, DE
en
978-3-86130-245-2
1
Jean-ChristopheGraz
KaiJakobs
inproceedings
Eisenblaetter10
<prt>A Two-Stage Approach to WLAN Planning: Detailed Performance Evaluation Along the Pareto Frontier</prt>
2010
227 -236
Proc. of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'10)
AndreasEisenblätter
Hans-FlorianGeerdes
JamesGross
OscarPuñal
JonasSchweiger
inproceedings
201003GarciaEffContAwareAccControlPMS
Efficient and Context-Aware Access Control for Pervasive Medical Sensor Networks
2010
Proceedings of the First IEEE PerCom Workshop on Pervasive Healthcare
OscarGarcia-Morchon
KlausWehrle
inproceedings
201006GarciaIFIPTM
On Applications of Cooperative Security in Distributed Networks
2010
ManyapplicationsrunningontheInternetoperateinfullyor semi-distributed fashion including P2P networks or social networks. Dis- tributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability. In particular, faulty or mis- behaving nodes cannot collude to subvert the system operation.
This paper addresses the above threats by applying cooperative security techniques to relevant distributed systems in the Internet. Our goal is to present methods that allow the peers to bootstrap basic trust relation- ships at the time of joining a distributed network and remove the peers if trust is lost. We consider the specific security caveats of the analyzed sys- tems, investigate the applicability of existing cooperative security-based protocols, and propose general design guidelines for cooperative-security protocol in described distributed systems.
Print
Springer
Berlin
Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management
Morioka, Japan
4th International Conference on Trust Management
en
978-3-642-13445-6
1
DmitriyKuptsov
OscarGarcia-Morchon
KlausWehrle
AndreiGurtov
inproceedings
201006GarciaSacmat
Modular Context-Aware Access Control for Medical Sensor Network
2010
Medical sensor networks allow for pervasive health monitoring of users in hospitals, at home, or on the way. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that unauthorized parties cannot retrieve confidential information. This is a great challenge due to two main reasons. First, wireless sensors are resource-constrained devices that limit the applicability of traditional solutions. Second, the access control system must be context-aware and adapt its security settings to ensure the users' safety during, e.g., medical emergencies. To solve these issues, this paper presents a modular context-aware access control system tailored to pervasive medical sensor networks in which the access control decisions and the response delay depend upon the health acuteness of a user. Our system extends traditional role-based access control systems by allowing for context-awareness in critical, emergency, and normal access control situations. We further present a lightweight encoding for our modular access control policies as well as an access control engine efficiently running on resource-constrained sensor nodes. Finally, we analyze how the proposed access control system suits existing security architectures for medical sensor networks.
Pittsburgh, USA
Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT'10)
ACM
978-1-4503-0049-0
10.1145/1809842.1809864
1
OscarGarcia-Morchon
KlausWehrle
inproceedings
200912BitschSimBetAge
SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks
2009
12
1
13--18
In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.
RatPack
fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf
http://portal.acm.org/citation.cfm?id=1659029.1659034&coll=DL&dl=GUIDE&CFID=6806120&CFTOKEN=29162094
http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf
Online
Paulo Mendes, Oliver Marcé
ACM
New York City, NY, USA
U-NET '09
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy
ACM
Rome, Italy
1st ACM workshop on User-provided networking: challenges and opportunities
1 Dec. 2009
en
978-1-60558-750-9
http://doi.acm.org/10.1145/1659029.1659034
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
inproceedings
2009-sensys-alizai-burstytraffic
Bursty Traffic over Bursty Links
2009
11
71-84
wld
fileadmin/papers/2009/2009-alizai-sensys-bre.pdf
ACM
New York, NY, USA
Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA
Berkley, California
Sensys 09
November 2009
en
978-1-60558-519-2
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
techreport
200908alizaifgsnburstyrouting
Routing Over Bursty Wireless Links
2009
9
63-66
Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.
wld
fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf
doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
en
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
inproceedings
2009-landsiedel-visa-vipe
A Virtual Platform for Network Experimentation
2009
8
17
45--52
Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive.
In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.
deployment, network experimentation, resource virtualization, simulation
fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf
Print
ACM Press
New York, NY, USA
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain
Barcelona, Spain
1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures
August 17, 2009
en
978-1-60558-595-6
10.1145/1592648.1592657
1
OlafLandsiedel
GeorgKunz
StefanGötz
KlausWehrle
inproceedings
securityforpervasivemedicalsensornetworks
Security for Pervasive Medical Sensor Networks
2009
7
13
1
http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-garcia-mobiq.pdf
Print
IEEE Press
Washington, DC, USA
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto
ICST/IEEE
Toronto, CAN
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)
en
978-963-9799-59-2
10.4108/ICST.MOBIQUITOUS2009.6832
1
OscarGarcia-Morchon
ThomasFalck
TobiasHeer
KlausWehrle
inproceedings
200907BitschMOBIQUITOUS09SimBetAge
SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking
2009
7
13
1--2
In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs.
poster and abstract
RatPack
fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363
Online
IEEE
New York City, NY, USA
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada
ICST/IEEE
Toronto, ON, Canada
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)
July 13-16, 2009
en
978-963-9799-59-2
10.4108/ICST.MOBIQUITOUS2009.7017
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
conference
2009-iscc-samad-NNCQ
Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks
2009
7
5
763-769
Online
IEEE
IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia
Sousse, Tunisia
IEEE Symposium on Computers and Communications
en
978-1-4244-4671-1
SadeqAli Makram
FahadSamad
MesutGuenes
poster
2009-kunz-nsdi-profab
Poster Abstract: Protocol Factory: Reuse for Network Experimentation
2009
4
22
fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf
Poster
Online
USENIX Association
Berkeley, CA, USA
6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)
en
1
GeorgKunz
OlafLandsiedel
StefanGötz
KlausWehrle
article
Gross09a
<prt>Enhancing IEEE 802.11a/n with Dynamic Single-User OFDM Adaptation</prt>
Elsevier Performance Evaluation Journal
2009
66
3-5
240--257
JamesGross
MarcEmmelmann
OscarPuñal
AdamWolisz
inproceedings
Gross09
<prt>Multi-User OFDMA Frame Aggregation for Future Wireless Local Area Networking</prt>
2009
220--233
Proc. of the 8th International IFIP Networking Conference (NETWORKING'09)
JamesGross
OscarPuñal
MarcEmmelmann
inproceedings
200906MobiArchgoetzprotocolorchestration
Protocol Orchestration: A Semantic Approach to Communication Stacks
2009
43-50
The diversity of today's networking environments, such as wired, wireless, cell-based, or multi-hop, is matched by an equally large amount and heterogeneity of specialized protocols, e.g., overlays, Wi-Fi positioning, MANET routing, cross-layer signaling. However, communication is typically performed with a static set of protocols selected at design time based on simplified assumptions ignoring the environment's heterogeneity. In this paper, we argue that protocols can be orchestrated as software components driven purely by their functionality and the demands of the execution environment. Our end-system protocol framework Adapt bases on extensible ontological models that semantically describe protocol and environment properties. At runtime, each connection receives a custom-tailored protocol stack that Adapt orchestrates from the requirements derived from the application, user, and environment. With this approach, end-systems can reason about the functionality and quality of automatically composed and adapted protocol compounds while remaining open to existing and future protocols.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-goetz-mobiarch-protocol-orchestration.pdf
print
Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca
ACM
New York, NY, USA
print
Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09)
ACM Sigcomm/Sigmobile
Krakow, Poland
Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09), Krakow, Poland
2009-06-22
en
1
StefanGötz
TobiasHeer
KlausWehrle
inproceedings
2009morchonpodckeyagreementwsn
Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks
2009
1
326-327
Brief Announcement
Print
ACM
New York, NY, USA
Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), Calgary
Calgary, CN
28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009)
en
978-963-9799-59-2
10.1145/1582716.1582791
1
OscarGarcia-Morchon
TobiasHeer
LudoTolhuizen
KlausWehrle
inproceedings
2009-icc-heer-middleboxes
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace
2009
1
791-796
Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf
Print
Piscataway, NJ, USA
Dresden, Germany
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany
IEEE
Dresden, Germany
IEEE International Conference on Communications 2009 (ICC 2009)
en
978-1-4244-3435-0
1938-1883
10.1109/ICC.2009.5198984
1
TobiasHeer
RenéHummen
MiikaKomu
StefanGötz
KlausWehrle
inproceedings
goetz2008adapt
ADAPT: A Semantics-Oriented Protocol Architecture
2008
12
10
5343/2008
287-292
Although modularized protocol frameworks are flexible and adaptive to the increasing heterogeneity of networking environments, it remains a challenge to automatically compose communication stacks from protocol modules. The typical static classification into network layers or class hierarchies cannot appropriately accommodate cross-cutting changes such as overlay routing or cross-layer signaling. In this paper, we discuss how protocol composition can be driven by functionality and demand at runtime based on extensible semantic models of protocols and their execution environment. Such an approach allows to reason about the functionality and quality of automatically composed and adapted protocol compounds and it is open to existing and future protocols.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-goetz-mobiarch-adapt.pdf
Print
Karin Anna Hummel and James P. G. Sterbenz
Springer-Verlag
Tiergartenstraße 17, 69121 Heidelberg, Germany
Lecture Notes in Computer Science
Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria
Vienna, Austria
3rd International Workshop on Self-Organizing Systems (IWSOS)
2008-12-10
en
978-3-540-92156-1
10.1007/978-3-540-92157-8\_27
1
StefanGötz
ChristianBeckel
TobiasHeer
KlausWehrle
inproceedings
heer-2008-conext-alpha
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
2008
12
1
23:1--23:12
http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-conext-alpha.pdf
Print
ACM
New York, NY, USA
CoNEXT '08
Proceedings of the 2008 ACM CoNEXT Conference, Madrid, Spain
Madrid, Spain
ACM Conext 2008
December 2008
en
978-1-60558-210-8
10.1145/1544012.1544035
1
TobiasHeer
StefanGötz
OscarGarcia-Morchon
KlausWehrle
conference
2008-heer-pisa-full
Secure Wi-Fi Sharing at Global Scales
2008
6
16
1
1-7
The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet uplinks among users has first become popular in communities of individuals and has recently been adopted as a business model by several companies. However, existing implementations and proposals suffer from the security risks of directly providing Internet access to strangers. In this paper, we present the P2P Wi-Fi Internet Sharing Architecture PISA, which eliminates these risks by introducing secure tunneling, cryptographic identities, and certificates as primary security concepts. Thus, PISA offers nomadic users the same security that they expect from a wired Internet connection at home. Based on its three fundamental mechanisms, PISA achieves a flexibility which opens significant advantages over existing systems. They include user mobility, anonymity, service levels with different performance and availability characteristics, and different revenue models for operators. With this combination of key features, PISA forms an essential basis for global, seamless, and secure Wi-Fi sharing for large communities.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-ict-secure-wifi.pdf
Print
IEEE
Washington, DC, USA
Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation
St. Petersburg, Russian Federation
15th International Conference on Telecommunication (ICT)
16-19 June 2008
en
978-1-4244-2035-3
1
TobiasHeer
StefanGötz
EliasWeingaertner
KlausWehrle
inproceedings
wessel2008GMDS
Software-Engineering in Multidisciplinary Teams in Health Informatics: Quality Assurance with GREME Reviews
2008
665-667
German Medical Science GMS Publishing House
53. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (gmds). Brückenschlag von Medizinischer Informatik, Biometrie und Epidemiologie zur Medizintechnik, Stuttgart, Germany
en
ChristaWeßel
SandraGeisler
UtaChristoph
inproceedings
Gross07
<prt>Dynamic Single-User OFDM Adaptation for IEEE 802.11 Systems</prt>
2007
124--132
Proc. of ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'07)
JamesGross
MarcEmmelmann
OscarPuñal
AdamWolisz
inproceedings
GarciaMorchonEtAl2007
Cooperative Security in Distributed Sensor Networks
2007
1
Print
IEEE
Washington, DC, USA
1
Proceedings of the third International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007
IEEE
CollaborateCom
en
978-1-4244-1318-8
1
OscarGarcia-Morchon
HeribertBaldus
TobiasHeer
KlausWehrle
inproceedings
2006-heer-percomws-adapt-dht
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
2006
3
16
1
1-6
http://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2006-heer-percomws-dht-adhoc.pdf
Print
IEEE
Washington, DC, USA
In Proceedings of 3. IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P'06), Pisa, Italy.
Pisa, Italy
IEEE International Workshop on Mobile Peer-to-Peer Computing
March 2006
en
0-7695-2520-2
10.1109/PERCOMW.2006.16
1
TobiasHeer
StefanGötz
SimonRieche
KlausWehrle
inproceedings
200608landsiedelp2p06scalablemobility
Towards Scalable Mobility in Distributed Hash Tables
2006
203-209
For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, we explore how DHTs and mobile ad-hoc networks (MANETs) fit together. We argue that both share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we argue that with little global knowledge, such as a map of the city or whatever area the nodes move in, one can even further improve the scalability and reduce DHT maintenance overhead significantly, allowing MHT to scale up to several ten thousands of nodes.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2006/2006-landsiedel-p2p-mobility.pdf
print
IEEE
Washington, DC, USA
print
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), Cambridge, UK
IEEE
Cambridge, UK
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06)
2006-09-06
en
0-7695-2679-9
10.1109/P2P.2006.46
1
OlafLandsiedel
StefanGötz
KlausWehrle
inproceedings
200503goetzp2psawindowsfilesharing
Spontaneous Windows File Sharing via Virtual Groups
2005
2
28
61
143-146
Although File and printer sharing services have been deployed almost ubiquitously for a long time as part of Microsoft Windows, only recent peer-to-peer applications popularized file-sharing on a global scale. As the Windows CIFS protocol was designed for local area networks, its use has been con?ned to relatively small environments. We propose a mechanism to set up spontaneous virtual groups that allow to use legacy Windows file and printer sharing globally in virtual LANs.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2005-goetz-kivs-spontaneous-file-sharing.pdf
print
Paul Müller, Reinhard Gotzhein, Jens B. Schmitt
Gesellschaft für Informatik (GI)
Bonn, Germany
print
LNI
Proceedings of Workshop on Peer-to-Peer-Systems and -Applications
Gesellschaft für Informatik (GI)
Kaiserslautern, Germany
Kommunikation in Verteilten Systemen (KiVS), Kaiserslautern, Germany
2005-02-28
en
3-88579-390-3
1
StefanGötz
KlausWehrle
inbook
200509riechep2pbookreliability
Reliability and Load Balancing in Distributed Hash Tables
2005
119-135
Ralf Steinmetz, Klaus Wehrle
Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS
9
Peer-to-Peer Systems and Applications
SimonRieche
HeikoNiedermayer
StefanGötz
KlausWehrle
inbook
200509goetzp2pbookdhtalgorithms
Selected Distributed Hash Table Algorithms
2005
95-117
Ralf Steinmetz, Klaus Wehrle
Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS
8
Peer-to-Peer Systems and Applications
StefanGötz
SimonRieche
KlausWehrle
inbook
200509wehrlep2pbookdhts
Distributed Hash Tables
2005
79-93
Ralf Steinmetz, Klaus Wehrle
Springer
Heidelberg, Germany
Lecture Notes in Computer Science, LNCS
7
Peer-to-Peer Systems and Applications
KlausWehrle
StefanGötz
SimonRieche
inproceedings
200503landsiedelfgsnaeon
Project AEON
2005
481
72-76
Power consumption is a crucial characteristic of sensor networks and their applications, as sensor nodes are commonly battery driven. Although recent research focuses strongly on energy aware applications and operating systems, power consumption is still a limiting factor. Once sensor nodes are deployed, it is challenging and sometimes even impossible to change batteries. As a result, erroneous lifetime prediction causes high costs and may render a sensor network useless, before its purpose is fulfilled. In this paper we present AEON, a novel evaluation tool to quantitatively predict power consumption of sensor nodes and whole sensor networks. Our energy model, based on measurements of node current draw and the execution of real code, enables accurate prediction of the actual power consumption of sensor nodes. Consequently, preventing erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency.
Zürich, CH
Proceedings of the 4th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Techical Report No. 481
OlafLandsiedel
KlausWehrle
SimonRieche
StefanGötz
LeoPetrak
inproceedings
200511goetzmmsctransparent
Transparent End-Host-Based Service Composition through Network Virtualization
2005
31-36
Mobile devices have become a popular medium for delivering multimedia services to end users. A large variety of solutions have been proposed to flexibly compose such services and to provide quality-of-service guarantees for the resulting contents. However, low-level mobility artifacts resulting from network transitions (disconnected operation, reconfiguration, etc.) still prevent a seamless user experience of these technologies. This paper presents an architecture for supporting legacy applications with such solutions in mobile scenarios. Through network virtualization, it hides mobility artifacts and ensures connectivity at the network and transport level. Its adoption for multimedia applications poses unique challenges and advantages, which are discussed herein.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2005-goetz-mmc-transparent-service-composition.pdf
print
Wolf-Tilo Balke and Klara Nahrstedt
ACM
New York, NY, USA
print
Proceedings of the First ACM International Workshop on Multimedia Service Composition at International Multimedia Conference
ACM
Singapore
First ACM International Workshop on Multimedia Service Composition at International Multimedia Conference, Singapore
2005-08-01
en
1-59593-245-3
10.1145/1099423.1099430
1
StefanGötz
KlausWehrle
inproceedings
200410riechehotp2preliability
Reliability of Data in Structured Peer-to-Peer Systems
2004
10
108-113
Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. For this purpose Distributed Hash Tables (DHT) offer a highly scalable and self-organizing paradigm for efficient distribution and retrieval of data. Thereby a common assumption of P2P-Systems is, that the participating nodes are unreliable and may fail at any time. Since many of research goes into the design of DHT lookup services, these systems aim to provide a stable global addressing structure. But to storage data reliable in a DHT only few techniques were already developed. However since data has to be stored persistent in the network, it should be retrieved anytime, even if nodes fail. In this work we discuss possibilities to store data fault tolerant in a structured Peer-to-Peer system.
Print
Proceedings of HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
Volendam, Netherlands
HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer
Oct. 2004
en
1
SimonRieche
KlausWehrle
OlafLandsiedel
StefanGötz
LeoPetrak
inproceedings
200410wehrlefgpcintegriertekonstruktionsmethode
Integrierte Konstruktionsmethoden für flexible Protokolle in ubiquitären Kommunikationssystemen
2004
Stuttgart, Germany
Proceedings of the GI/ITG KuVS Fachgespräch Systemsoftware für Pervasive Computing
KlausWehrle
OlafLandsiedel
SimonRieche
StefanGötz
LeoPetrak
inproceedings
200407wehrlesmsoipncontentoriented
Content-oriented Bridging of Today's Internet Heterogeneity
2004
04411
Matthias Bossardt and Georg Carle and D. Hutchison and Hermann de Meer and Bernhard Plattner
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany
Dagstuhl Seminar Proceedings
Service Management and Self-Organization in IP-based Networks
KlausWehrle
StefanGötz