% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-26 % Creation time: 06-02-38 % --- Number of references % 9 % @Inproceedings { 2012-hummen-cloud, title = {A Cloud Design for User-controlled Storage and Processing of Sensor Data}, year = {2012}, month = {12}, day = {3}, pages = {232-240}, tags = {sensorcloud}, url = {fileadmin/papers/2012/2012-hummen-cloud.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan}, event_place = {Taipei, Taiwan}, event_name = {Fourth IEEE International Conference on Cloud Computing Technology and Science}, language = {en}, ISBN = {978-1-4673-4511-8}, DOI = {10.1109/CloudCom.2012.6427523}, reviewed = {1}, author = {Hummen, Ren{\'e} and Henze, Martin and Catrein, Daniel and Wehrle, Klaus} } @Inproceedings { 2012-mass-wirtz-dlsd, title = {DHT-based Localized Service Discovery in Wireless Mesh Networks}, year = {2012}, month = {10}, pages = {10 S.}, url = {fileadmin/papers/2012/2012-mass-wirtz-dlsd.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, booktitle = {Proceedings of The Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), October 8-11 2012, Las Vegas, NV, USA}, event_place = {Las Vegas, USA}, event_name = {Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012)}, event_date = {8-11 October 2012}, language = {en}, ISBN = {978-1-4673-2433-5}, DOI = {10.1109/MASS.2012.6502498}, reviewed = {1}, author = {Wirtz, Hanno and Heer, Tobias and Serror, Martin and Wehrle, Klaus} } @Inproceedings { 2012-pimrc-schmidt-ofra, title = {A Receiver-Based 802.11 Rate Adaptation Scheme with On-Demand Feedback}, year = {2012}, month = {9}, day = {10}, pages = {1--7}, abstract = {Classical 802.11 rate adaptation algorithms rely on feedback from the receiver to correctly choose a sending rate, typically in the form of acknowledgments (ACKs). In the absence of such frames, novel techniques are required for rate selection. We present OFRA, a receiver-based rate adaptation algorithm that works with ACK-less traffic. Feedback information is sent on-demand using a control frame to explicitly inform the transmitter about which bit rate to use on subsequent data frames. This approach guarantees standard conformity and exhibits fast and accurate bit rate adaptation at the cost of a modest overhead increase. We evaluate the performance of OFRA against various state-of-the-art rate adaptation schemes by means of simulations. If ACK frames are to be transmitted, OFRA performs better than related work in most considered scenarios, and on par in the others. In the absence of ACKs, OFRA provides large goodput gains under good channel conditions and comparable goodput in other situations.}, tags = {OFRA refector}, url = {fileadmin/papers/2012/2012-schmidt-pimrc-ofra.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12)}, event_date = {9-12 September 2012}, language = {en}, ISBN = {978-1-4673-2566-0}, ISSN = {2166-9570}, DOI = {10.1109/PIMRC.2012.6362818}, reviewed = {1}, author = {Schmidt, Florian and Hithnawi, Anwar and Pu{\~n}al, Oscar and Gross, James and Wehrle, Klaus} } @Techreport { 2012-draft-hummen-hip-middle-puzzle, title = {HIP Middlebox Puzzle Offloading and End-host Notification}, year = {2012}, month = {7}, day = {9}, number = {draft-hummen-hip-middle-puzzle-00}, abstract = {The Host Identity Protocol [RFC5201] is a secure signaling protocol with a cryptographic namespace. It provides the communicating peers with a cryptographic puzzle mechanism to protect against Denial of Service (DoS) attacks targeting its computation and memory overhead. This document specifies an extension that enables middleboxes to assist in the choice of the puzzle difficulty as well as in solving the puzzle on behalf of the host.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-hip-middle-puzzle-00}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Hummen, Ren{\'e} and Henze, Martin} } @Inproceedings { 2012-hummen-seams, title = {SEAMS: A Signaling Layer for End-host-Assisted Middlebox Services}, year = {2012}, month = {6}, day = {25}, pages = {525--532}, url = {fileadmin/papers/2012/2012-hummen-seams.pdf}, booktitle = {Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)}, organization = {IEEE}, event_place = {Liverpool, United Kingdom}, language = {en}, ISBN = {978-1-4673-2172-3}, DOI = {10.1109/TrustCom.2012.250}, reviewed = {1}, author = {Hummen, Ren{\'e} and Ziegeldorf, Jan Henrik and Heer, Tobias and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { WirtzHHW2012, title = {Mesh-DHT: A Locality-Based Distributed Look-Up Structure for Wireless Mesh Networks}, year = {2012}, month = {6}, day = {14}, pages = {653-658}, url = {fileadmin/papers/2012/2012_wirtz_icc_mesh_dht.pdf}, misc2 = {Print Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC 2012), Ottawa, Canada}, event_place = {Ottawa, Canada}, event_name = {ICC 2012}, event_date = {10.-15.06.2012}, language = {en}, ISBN = {978-1-4577-2051-2}, DOI = {10.1109/ICC.2012.6364336}, reviewed = {1}, author = {Wirtz, Hanno and Heer, Tobias and Hummen, Ren{\'e} and Wehrle, Klaus} } @Techreport { 2012-draft-garcia-core-security, title = {Security Considerations in the IP-based Internet of Things}, year = {2012}, month = {3}, day = {26}, number = {draft-garcia-core-security-04}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2012-aktas-simutools-FANTASY:FullyAutomaticNetworkEmulationArchitecturewithCross-LayerSupport-conference, title = {FANTASY: Fully Automatic Network Emulation Architecture with Cross-Layer Support}, year = {2012}, month = {3}, day = {19}, pages = {57-64}, tags = {crawler, fantasy}, url = {fileadmin/papers/2012/2012-aktas-simutools-fantasy.pdf}, web_url = {http://dl.acm.org/citation.cfm?id=2263019\&CFID=88550183\&CFTOKEN=31687193}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools '12), Desenzano del Garda, Italy}, event_place = {Desenzano, Italy}, event_name = {5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools '12)}, event_date = {19-23 March, 2012}, language = {en}, ISBN = {978-1-4503-1510-4}, DOI = {10.4108/icst.simutools.2012.247759}, reviewed = {1}, author = {Aktas, Ismet and vom Lehn, Hendrik and Habets, Christoph and Schmidt, Florian and Wehrle, Klaus} } @Phdthesis { heer2011direct, title = {Direct End-to-Middle Authentication in Cooperative Networks}, year = {2012}, month = {2}, day = {7}, url = {http://darwin.bth.rwth-aachen.de/opus3/volltexte/2012/3938/}, publisher = {Shaker}, address = {Aachen, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {3}, school = {RWTH Aachen University}, institute = {Chair for Communication and Distributed Systems}, type = {Ph.D. Thesis}, ISBN = {978-3-8440-0710-7}, reviewed = {1}, author = {Heer, Tobias} }