This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-04-23
Creation time: 22-28-29
--- Number of references
6
inproceedings
2009-kunz-mascots-horizon
Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation
2009
9
21
575-577
This paper presents Horizon, an extension to network simulation that enables the efficient and detailed simulation of wireless networks. Our contributions are two-fold as Horizon provides i) an API for accurately modeling processing time of discrete event simulation models by augmenting events with time spans and ii) a lightweight parallelization scheme that utilizes timing information to guide the parallel execution of simulations on multi-core computers. In this paper we primarily focus on the latter.
horizon
fileadmin/papers/2009/2009-kunz-mascots-horizon.pdf
Poster
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), London, UK
London, Great Britain
17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09)
September 21-32, 2009
en
978-1-4244-4926-2
1526-7539
10.1109/MASCOT.2009.5366710
1
GeorgKunz
OlafLandsiedel
KlausWehrle
inproceedings
2009-landsiedel-visa-vipe
A Virtual Platform for Network Experimentation
2009
8
17
45--52
Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive.
In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.
deployment, network experimentation, resource virtualization, simulation
fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf
Print
ACM Press
New York, NY, USA
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain
Barcelona, Spain
1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures
August 17, 2009
en
978-1-60558-595-6
10.1145/1592648.1592657
1
OlafLandsiedel
GeorgKunz
StefanGötz
KlausWehrle
poster
2009-kunz-nsdi-profab
Poster Abstract: Protocol Factory: Reuse for Network Experimentation
2009
4
22
fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf
Poster
Online
USENIX Association
Berkeley, CA, USA
6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)
en
1
GeorgKunz
OlafLandsiedel
StefanGötz
KlausWehrle
inproceedings
DBLP:conf/icaart/ChristophKW09
JamochaAgent - A Rule-based Programmable Agent
2009
1
447-454
Print
Joaquim Filipe and Ana L. N. Fred and Bernadette Sharp
INSTICC Press
ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal
en
978-989-8111-66-1
UtaChristoph
Karl-HeinzKrempels
AlexanderWilden
inproceedings
2009-icc-heer-middleboxes
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace
2009
1
791-796
Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf
Print
Piscataway, NJ, USA
Dresden, Germany
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany
IEEE
Dresden, Germany
IEEE International Conference on Communications 2009 (ICC 2009)
en
978-1-4244-3435-0
1938-1883
10.1109/ICC.2009.5198984
1
TobiasHeer
RenéHummen
MiikaKomu
StefanGötz
KlausWehrle
techreport
2009-heer-draft-midauth
End-Host Authentication for HIP Middleboxes (Version 2)
2009
draft-heer-hip-midauth-02
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
MiikaKomu
KlausWehrle