% % This file was created by the TYPO3 extension % bib % --- Timezone: CET % Creation date: 2024-03-28 % Creation time: 10-44-42 % --- Number of references % 5 % @Inproceedings { 2007-heer-pisa, title = {PISA: P2P Wi-Fi Internet Sharing Architecture}, journal = {Seventh IEEE International Conference on Peer-to-Peer Computing, P2P 2007}, year = {2007}, month = {9}, day = {2}, volume = {1}, pages = {251-252}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2007/2007-p2p-heer-pisa.pdf}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, booktitle = {Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing, 2007. P2P 2007, Galway, Ireland.}, event_place = {Galway, Ireland}, event_name = {Seventh IEEE International Conference on Peer-to-Peer Computing, 2007. P2P 2007.}, language = {en}, ISBN = {978-0-7695-2986-8}, DOI = {10.1109/P2P.2007.12}, reviewed = {1}, author = {Heer, Tobias and Li, Shaohui and Wehrle, Klaus} } @Article { LandsiedelEtAl2007, title = {MHT: A Mobility-Aware Distributed Hash Table}, journal = {Special Issue on Peer-to-Peer of the it - Information Technology Journal}, year = {2007}, volume = {49}, number = {5}, pages = {298-303}, abstract = {Mobile ad-hoc networks and distributed hash tables share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we discuss practical challenges such as Churn, load balacing and security of the Mobile Hash Table. A special focus is put on the differences and new challenges that the use of a DHT in a mobile environment poses.}, note = {http://it-Information-Technology.de}, misc2 = {Print}, publisher = {Oldenbourg Verlag}, address = {Munich, Germany}, language = {en}, ISSN = {1611-2776}, reviewed = {1}, author = {Landsiedel, Olaf and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { GarciaMorchonEtAl2007, title = {Cooperative Security in Distributed Sensor Networks}, year = {2007}, volume = {1}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, series = {1}, booktitle = {Proceedings of the third International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007}, organization = {IEEE}, event_name = {CollaborateCom}, language = {en}, ISBN = {978-1-4244-1318-8}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Baldus, Heribert and Heer, Tobias and Wehrle, Klaus} } @Techreport { 2007-heer-draft-lhip, title = {LHIP Lightweight Authentication Extension for HIP}, year = {2007}, abstract = {This document specifies the Lightweight authentication extension forthe Host Identifier Protocol (LHIP). The goal of LHIP is to reduce the computational requirements of the Host Identifier Protocol (HIP), thus, making its benefits, such as end-host mobility and multihoming, accessible to CPU-restricted devices. LHIP reduces the computational cost of establishing, updating, and closing a HIP association by providing an alternative way of signing and verifying HIP control packets which is based on computationally inexpensive hash function computations and hash chains. However, LHIP does not provide nor does it aim at providing the same level of security as HIP does. Especially, host authentication and payload encryption are not possible. The LHIP extensions in this draft specify also mechanisms for dynamic transitioning between lightweight and full HIP associations on the fly.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias} } @Techreport { 2007-heer-draft-midauth, title = {End-Host Authentication for HIP Middleboxes}, year = {2007}, number = {draft-heer-hip-midauth-00}, abstract = {The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias} }