This file was created by the TYPO3 extension bib --- Timezone: UTC Creation date: 2024-12-05 Creation time: 18-56-03 --- Number of references 8 inproceedings 2007-heer-pisa PISA: P2P Wi-Fi Internet Sharing Architecture Seventh IEEE International Conference on Peer-to-Peer Computing, P2P 2007 2007 9 2 1 251-252 http://www.comsys.rwth-aachen.de/fileadmin/papers/2007/2007-p2p-heer-pisa.pdf Print IEEE
Washington, DC, USA
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing, 2007. P2P 2007, Galway, Ireland. Galway, Ireland Seventh IEEE International Conference on Peer-to-Peer Computing, 2007. P2P 2007. en 978-0-7695-2986-8 10.1109/P2P.2007.12 1 TobiasHeer ShaohuiLi KlausWehrle
techreport 2007-fgsn-alizai-timetossim Accurate Timing in Sensor Network Simulations 2007 7 fileadmin/papers/2008/2007-07-fgsn-alizai-accurate-timing.pdf https://www.ds-group.info/events/fgsn07/fgsn07proc.pdf Print RWTH Aachen
Aachen, Germany
Proceedings of the 6th GI/ITG KuVS Workshop on Wireless Sensor Networks (FGSN 07) RWTH Aachen Aachen, Germany FGSN 07 July 2007 en Muhammad HamadAlizai OlafLandsiedel KlausWehrle
article 200707ITp2p Peer-to-Peer Systems (Editorial) Special Issue on Peer-to-Peer of the it - Information Technology Journal 2007 49 ISSN 0935-3232 http://it-Information-Technology.de RalfSteinmetz KlausWehrle NicolasLiebau article LandsiedelEtAl2007 MHT: A Mobility-Aware Distributed Hash Table Special Issue on Peer-to-Peer of the it - Information Technology Journal 2007 49 5 298-303 Mobile ad-hoc networks and distributed hash tables share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we discuss practical challenges such as Churn, load balacing and security of the Mobile Hash Table. A special focus is put on the differences and new challenges that the use of a DHT in a mobile environment poses. http://it-Information-Technology.de Print Oldenbourg Verlag
Munich, Germany
en 1611-2776 1 OlafLandsiedel TobiasHeer KlausWehrle
inbook 2007landsiedelwsnalgpseudo Pseudo Geometric Routing in Sensor Networks 2007 203-213 http://www.springer.com/computer/communications/book/978-3-540-74990-5 Dorothea Wagner, Roger Wattenhofer Springer Lecture Notes in Computer Science, Theoretical Computer Science and General Issues 11 Algorithms for Sensor and Ad-Hoc Networks OlafLandsiedel conference 200711Globecom2007Landsiedelmultipathonionrouting Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks 2007 Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing a static tunnel through an overlay network is build via layered encryption. All traffic exchanged by its end points is relayed through this tunnel.In contrast, this paper introduces dynamic multipath Onion Routing to extend the static Onion Routing paradigm. This approach allows each packet exchanged between two end points to travel along a different path. To provide anonymity the first half of this path is selected by the sender and the second half by the receiver of the packet. The results are manifold: First, dynamic multipath Onion Routing increases the resilience against threats, especially pattern and timing based analysis attacks. Second, the dynamic paths reduce the impact of misbehaving and overloaded relays. Finally, inspired by Internet routing, the forwarding nodes do not need to maintain any state about ongoing flows and so reduce the complexity of the router. In this paper, we describe the design of our dynamic Multipath Onion Router (MORE) for peer-to-peer overlay networks, and evaluate its performance. Furthermore, we integrate address virtualization to abstract from Internet addresses and provide transparent support for IP applications. Thus, no application-level gateways, proxies or modifications of applications are required to sanitize protocols from network level information. Acting as an IP-datagram service, our scheme provides a substrate for anonymous communication to a wide range of applications using TCP and UDP. IEEE Global Communication Conference (GlobeCom), Washington D.C. OlafLandsiedel AlexisPimenidis KlausWehrle HeikoNiedermayer GeorgCarle inproceedings 200706juriFGSN07platform Simulation von plattformunabhängigen TinyOS-Applikationen mit ns-2 2007
Aachen, Germany
Proceedings of 6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks" JuriSaragazki OlafLandsiedel KlausWehrle
inproceedings 200707SchmidtFGSN07composition Smart Composition of Sensor Network Applications 2007
Aachen, Germany
Proceedings of 6th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Aachen StefanSchmitz OlafLandsiedel KlausWehrle