% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-24 % Creation time: 06-53-39 % --- Number of references % 123 % @Article { 2024_pennekamp_supply-chain-survey, title = {An Interdisciplinary Survey on Information Flows in Supply Chains}, journal = {ACM Computing Surveys}, year = {2024}, month = {2}, day = {1}, volume = {56}, number = {2}, abstract = {Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.}, keywords = {information flows; data communication; supply chain management; data security; data sharing; systematic literature review}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf}, publisher = {ACM}, ISSN = {0360-0300}, DOI = {10.1145/3606693}, reviewed = {1}, author = {Pennekamp, Jan and Matzutt, Roman and Klinkm{\"u}ller, Christopher and Bader, Lennart and Serror, Martin and Wagner, Eric and Malik, Sidra and Spi{\ss}, Maria and Rahn, Jessica and G{\"u}rpinar, Tan and Vlad, Eduard and Leemans, Sander J. J. and Kanhere, Salil S. and Stich, Volker and Wehrle, Klaus} } @Inproceedings { 2023-wagner-lcn-repel, title = {Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols}, year = {2023}, month = {10}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wagner-repel.pdf}, publisher = {IEEE}, booktitle = {48th IEEE Conference on Local Computer Networks (LCN), Daytona Beach, Florida, US}, event_place = {Daytona Beach, Florida, US}, event_name = {IEEE Conference on Local Computer Networks (LCN)}, event_date = {Oktober 1-5, 2023}, state = {accepted}, language = {en}, reviewed = {1}, author = {Wagner, Eric and Rothaug, Nils and Wolsing, Konrad and Bader, Lennart and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2023_pennekamp_benchmarking_comparison, title = {Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking}, year = {2023}, month = {6}, day = {15}, volume = {13901}, pages = {489-505}, abstract = {Benchmarking is an essential tool for industrial organizations to identify potentials that allows them to improve their competitive position through operational and strategic means. However, the handling of sensitive information, in terms of (i) internal company data and (ii) the underlying algorithm to compute the benchmark, demands strict (technical) confidentiality guarantees—an aspect that existing approaches fail to address adequately. Still, advances in private computing provide us with building blocks to reliably secure even complex computations and their inputs, as present in industry benchmarks. In this paper, we thus compare two promising and fundamentally different concepts (hardware- and software-based) to realize privacy-preserving benchmarks. Thereby, we provide detailed insights into the concept-specific benefits. Our evaluation of two real-world use cases from different industries underlines that realizing and deploying secure information systems for industry benchmarking is possible with today's building blocks from private computing.}, note = {Lecture Notes in Computer Science (LNCS), Volume 13901}, keywords = {real-world computing; trusted execution environments; homomorphic encryption; key performance indicators; benchmarking}, tags = {internet-of-production}, url = {https://jpennekamp.de/wp-content/papercite-data/pdf/plv+23.pdf}, publisher = {Springer}, booktitle = {Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain}, event_place = {Zaragoza, Spain}, event_name = {35th International Conference on Advanced Information Systems Engineering (CAiSE '23)}, event_date = {June 12-16, 2023}, ISBN = {978-3-031-34559-3}, ISSN = {0302-9743}, DOI = {10.1007/978-3-031-34560-9_29}, reviewed = {1}, author = {Pennekamp, Jan and Lohm{\"o}ller, Johannes and Vlad, Eduard and Loos, Joscha and Rodemann, Niklas and Sapel, Patrick and Fink, Ina Berenice and Schmitz, Seth and Hopmann, Christian and Jarke, Matthias and Schuh, G{\"u}nther and Wehrle, Klaus and Henze, Martin} } @Incollection { 2023_pennekamp_crd-a.i, title = {Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead}, year = {2023}, month = {2}, day = {8}, pages = {35-60}, abstract = {The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.}, keywords = {Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_2}, reviewed = {1}, author = {Pennekamp, Jan and Belova, Anastasiia and Bergs, Thomas and Bodenbenner, Matthias and B{\"u}hrig-Polaczek, Andreas and Dahlmanns, Markus and Kunze, Ike and Kr{\"o}ger, Moritz and Geisler, Sandra and Henze, Martin and L{\"u}tticke, Daniel and Montavon, Benjamin and Niemietz, Philipp and Ortjohann, Lucia and Rudack, Maximilian and Schmitt, Robert H. and Vroomen, Uwe and Wehrle, Klaus and Zeng, Michael} } @Incollection { 2023_rueppel_crd-b2.ii, title = {Model-Based Controlling Approaches for Manufacturing Processes}, year = {2023}, month = {2}, day = {8}, pages = {221-246}, abstract = {The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).}, keywords = {Process control; Model-based control; Data aggregation; Model identification; Model optimization}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_7}, reviewed = {1}, author = {R{\"u}ppel, Adrian Karl and Ay, Muzaffer and Biernat, Benedikt and Kunze, Ike and Landwehr, Markus and Mann, Samuel and Pennekamp, Jan and Rabe, Pascal and Sanders, Mark P. and Scheurenberg, Dominik and Schiller, Sven and Xi, Tiandong and Abel, Dirk and Bergs, Thomas and Brecher, Christian and Reisgen, Uwe and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2022-rechenberg-cim, title = {Guiding Ship Navigators through the Heavy Seas of Cyberattacks}, year = {2022}, month = {10}, keywords = {Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf}, web_url = {https://zenodo.org/record/7148794}, publisher = {Zenodo}, booktitle = {European Workshop on Maritime Systems Resilience and Security (MARESEC 2022)}, event_place = {Bremerhaven, Germany}, DOI = {10.5281/zenodo.7148794}, reviewed = {1}, author = {von Rechenberg, Merlin and R{\"o}{\ss}ler, Nina and Schmidt, Mari and Wolsing, Konrad and Motz, Florian and Bergmann, Michael and Padilla, Elmar and Bauer, Jan} } @Article { 2022-jakobs-technologytransfer, title = {Too many or too few Standards Setters? Evidence from the Performance of Firms engaged in Standardization}, journal = {The Journal of Technology Transfer}, year = {2022}, month = {9}, day = {12}, abstract = {Theoretical models suggest that standardisation activities in the market may be too high or too low with respect to the market optimum. This paper investigates the association of standardisation engagement with firms'performance as indirect evidence of a sub-optimal level of market standardisation activities. Anecdotal evidence has it that firms can benefit from engagement in standardisation activities, but large quantitative studies on this topic are rather scarce. Based on a large innovation survey, this paper implements matching models to compare outcomes of firms with similar features but different standardisation activities. The outcomes of interest are several measures of innovation and growth. Standardisers and non-standardisers are matched onto a rich set of control variables. Firms engaged in standardisation have better innovation performance than firms with no such activities. However, the results for the performance measures are rather mixed, showing no association or negative association with labour productivity measures. Heteroscedasticity-based instruments mitigate possible endogeneity issues. These results can be interpreted as indirect evidence of low standardisation activity in the market, possibly due to long payback periods and appropriability issues of the standardisation investment.}, DOI = {10.1007/s10961-022-09951-z}, reviewed = {1}, author = {Riillo, Cesare Antonio Fabio and Jakobs, Kai} } @Article { 2022_brauner_iop, title = {A Computer Science Perspective on Digital Transformation in Production}, journal = {ACM Transactions on Internet of Things}, year = {2022}, month = {5}, day = {1}, volume = {3}, number = {2}, abstract = {The Industrial Internet-of-Things (IIoT) promises significant improvements for the manufacturing industry by facilitating the integration of manufacturing systems by Digital Twins. However, ecological and economic demands also require a cross-domain linkage of multiple scientific perspectives from material sciences, engineering, operations, business, and ergonomics, as optimization opportunities can be derived from any of these perspectives. To extend the IIoT to a true Internet of Production, two concepts are required: first, a complex, interrelated network of Digital Shadows which combine domain-specific models with data-driven AI methods; and second, the integration of a large number of research labs, engineering, and production sites as a World Wide Lab which offers controlled exchange of selected, innovation-relevant data even across company boundaries. In this article, we define the underlying Computer Science challenges implied by these novel concepts in four layers: Smart human interfaces provide access to information that has been generated by model-integrated AI. Given the large variety of manufacturing data, new data modeling techniques should enable efficient management of Digital Shadows, which is supported by an interconnected infrastructure. Based on a detailed analysis of these challenges, we derive a systematized research roadmap to make the vision of the Internet of Production a reality.}, keywords = {Internet of Production; World Wide Lab; Digital Shadows; Industrial Internet of Things}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-brauner-digital-transformation.pdf}, publisher = {ACM}, ISSN = {2691-1914}, DOI = {10.1145/3502265}, reviewed = {1}, author = {Brauner, Philipp and Dalibor, Manuela and Jarke, Matthias and Kunze, Ike and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Liebenberg, Martin and Michael, Judith and Pennekamp, Jan and Quix, Christoph and Rumpe, Bernhard and van der Aalst, Wil and Wehrle, Klaus and Wortmann, Andreas and Ziefle, Martina} } @Techreport { draft-irtf-coinrg-use-cases-02, title = {Use Cases for In-Network Computing}, year = {2022}, month = {3}, number = {draft-irtf-coinrg-use-cases-02}, note = {expires: 8 September 2022 (work in progress)}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf}, web_url = {https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/}, misc2 = {Online}, publisher = {IETF Trust}, series = {Internet Drafts}, organization = {Internet Engineering Task Force}, institution = {Internet Engineering Task Force}, author = {Kunze, Ike and Wehrle, Klaus and Trossen, Dirk and Montpetit, Marie-Jos{\'e} and de Foy, Xavier and Griffin, David and Rio, Miguel} } @Article { 2022-wolsing-aistracks, title = {Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches}, journal = {Journal of Marine Science and Engineering}, year = {2022}, month = {1}, day = {14}, volume = {10}, number = {1}, abstract = {The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, speed, and course of the sending vessels. AIS can thus serve as a tool to avoid collisions and increase onboard situational awareness. In recent years, AIS has been utilized in more and more applications since it enables worldwide surveillance of virtually any larger vessel and has the potential to greatly support vessel traffic services and collision risk assessment. Anomalies in AIS tracks can indicate events that are relevant in terms of safety and also security. With a plethora of accessible AIS data nowadays, there is a growing need for the automatic detection of anomalous AIS data. In this paper, we survey 44 research articles on anomaly detection of maritime AIS tracks. We identify the tackled AIS anomaly types, assess their potential use cases, and closely examine the landscape of recent AIS anomaly research as well as their limitations.}, keywords = {automatic identification system; AIS; anomaly detection; maritime safety; maritime security; maritime surveillance}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-aistracks.pdf}, web_url = {https://www.mdpi.com/2077-1312/10/1/112}, language = {en}, DOI = {10.3390/jmse10010112}, reviewed = {1}, author = {Wolsing, Konrad and Roepert, Linus and Bauer, Jan and Wehrle, Klaus} } @Article { 2022-jakobs-ieeetem, title = {Luring European SMEs into ICT Standardization–Problems, Issues, and a Potential Way Forward}, journal = {IEEE Transactions on Engineering Management}, year = {2022}, pages = {1-12}, abstract = {Common standards are essential for Information and Communication Technologies (ICT). Several studies suggest that (almost) all standardization working groups (WGs) are dominated by large firms and small and medium-sized enterprises (SMEs) and are typically marginalized. However, SMEs account for around 99\% of all enterprises in the EU; their active participation in the standardization process would thus be crucial to develop ICT standards that meet the needs of the vast majority of their users. This article first discusses the current situation of SMEs in ICT standardization and the associated issues. Second, it conducts an econometric analysis to investigate the drivers of the use of ICT standards and engagement in ICT standardization based on a large and representative survey from Luxembourg. Regardless of their size, firms that actually and consciously deploy ICT standards in their core business are much more prepared to participate in standards-setting actively than those that do not. The article also proposes a way to exploit this correlation. The resulting implications for standards-setting organizations and policymakers are discussedn.}, DOI = {10.1109/TEM.2022.3226121}, reviewed = {1}, author = {Riillo, Cesare Antonio Fabio and Jakobs, Kai} } @Inproceedings { 2021-kunze-spin-tracker, title = {Tracking the QUIC Spin Bit on Tofino}, year = {2021}, month = {12}, day = {7}, pages = {15–21}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-spin-tracker.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ '21)}, ISBN = {9781450391351}, DOI = {10.1145/3488660.3493804}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021-krude-nfp-pred, title = {Determination of Throughput Guarantees for Processor-based SmartNICs}, year = {2021}, month = {12}, day = {7}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-krude-nfp-pred.pdf}, publisher = {ACM}, booktitle = {The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21)}, ISBN = {978-1-4503-9098-9/21/12}, DOI = {10.1145/3485983.3494842}, reviewed = {1}, author = {Krude, Johannes and R{\"u}th, Jan and Schemmel, Daniel and Rath, Felix and Folbort, Iohannes-Heorh and Wehrle, Klaus} } @Inproceedings { 2021-sander-shardingrevisited, title = {Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?}, year = {2021}, month = {11}, day = {2}, tags = {legato}, url = {/fileadmin/papers/2021/2021-sander-sharding-revisited.pdf}, web_url = {https://arxiv.org/abs/2110.14239}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '21)}, event_name = {Internet Measurement Conference 2021}, event_date = {02.11.21 - 04.11.21}, ISBN = {978-1-4503-9129-0/21/11}, DOI = {10.1145/3487552.3487832}, reviewed = {1}, author = {Sander, Constantin and Bl{\"o}cher, Leo and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021_reuter_demo, title = {Demo: Traffic Splitting for Tor — A Defense against Fingerprinting Attacks}, year = {2021}, month = {9}, day = {14}, abstract = {Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.}, note = {Electronic Communications of the EASST, Volume 080}, keywords = {Onion Routing; Website Fingerprinting; Multipath Traffic; Privacy}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-reuter-splitting-demo.pdf}, publisher = {TU Berlin}, booktitle = {Proceedings of the 2021 International Conference on Networked Systems (NetSys '21), September 13-16, 2021, L{\"u}beck, Germany}, event_place = {L{\"u}beck, Germany}, event_date = {September 13-16, 2021}, ISSN = {1863-2122}, DOI = {10.14279/tuj.eceasst.80.1151}, reviewed = {1}, author = {Reuter, Sebastian and Hiller, Jens and Pennekamp, Jan and Panchenko, Andriy and Wehrle, Klaus} } @Inproceedings { 2021-kunze-efm-evaluation, title = {L, Q, R, and T - Which Spin Bit Cousin Is Here to Stay?}, year = {2021}, month = {7}, pages = {22 - 28}, url = {/fileadmin/papers/2021/2021-kunze-efm-evaluation.pdf}, publisher = {ACM}, booktitle = {ANRW '21: Proceedings of the Applied Networking Research Workshop}, event_place = {Virtual Event}, event_name = {Applied Networking Research Workshop (ANRW '21)}, event_date = {July 2021}, DOI = {10.1145/3472305.3472319}, reviewed = {1}, author = {Kunze, Ike and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021-glebke-service-based-forwarding, title = {Service-based Forwarding via Programmable Dataplanes}, year = {2021}, month = {6}, day = {10}, tags = {reflexes}, url = {/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)}, ISBN = {978-1-6654-4005-9}, ISSN = {2325-5609}, DOI = {10.1109/HPSR52026.2021.9481814}, reviewed = {1}, author = {Glebke, Ren{\'e} and Trossen, Dirk and Kunze, Ike and Lou, David and R{\"u}th, Jan and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2021-kunze-aqm-tofino-p4, title = {Tofino + P4: A Strong Compound for AQM on High-Speed Networks?}, year = {2021}, month = {5}, pages = {72-80}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf}, publisher = {IFIP/IEEE}, booktitle = {Proceedings of the International Symposium on Integrated Network Management (IM '21)}, event_place = {Virtual Event}, event_name = {International Symposium on Integrated Network Management (IM '21)}, event_date = {May 2021}, ISBN = {978-1-7281-9041-9}, reviewed = {1}, author = {Kunze, Ike and Gunz, Moritz and Saam, David and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021-sander-zoom-cc, title = {Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM}, year = {2021}, month = {3}, tags = {internet-of-production}, url = {/fileadmin/papers/2021/2021-sander-zoom-fairness-aqm.pdf}, web_url = {https://arxiv.org/abs/2107.00904}, publisher = {Springer}, booktitle = {Proceedings of the Passive and Active Measurement Conference (PAM '21)}, event_name = {Passive and Active Measurement Conference (PAM 2021)}, DOI = {10.1007/978-3-030-72582-2_1}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021-jacobs-euras-sme, title = {Luring SMEs into ICT Standardisation}, year = {2021}, volume = {16}, pages = {459-478}, editor = {Kai Jakobs}, publisher = {Mainz Publishers}, series = {EURAS Contributions to Standardisation Research}, booktitle = {Joint Proceedings: Standardisation and Innovation (EURAS 2021) and The Past, Present and Future of ICT Standardisation (SIIT 2021)}, event_name = {25th EURAS Annual Standardisation Conference and 11th International Conference on Standardisation and Innovation in Information Technology (SIIT)}, reviewed = {1}, author = {Riillo, Cesare Antonio Fabio and Jakobs, Kai} } @Inproceedings { 2021-jakobs-euras-standard, title = {Too Much or Too Little Standardization? - The performance of firms engaged in standardization}, year = {2021}, volume = {16}, pages = {479-498}, editor = {Kai Jakobs}, publisher = {Mainz Publishers}, series = {EURAS Contributions to Standardisation Research}, booktitle = {Joint Proceedings: Standardisation and Innovation (EURAS 2021) and The Past, Present and Future of ICT Standardisation (SIIT 2021)}, event_name = {25th EURAS Annual Standardisation Conference and 11th International Conference on Standardisation and Innovation in Information Technology (SIIT)}, reviewed = {1}, author = {Riillo, Cesare Antonio Fabio and Jakobs, Kai} } @Inproceedings { 2020_pennekamp_benchmarking, title = {Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking}, year = {2020}, month = {12}, day = {15}, pages = {31-44}, abstract = {Benchmarking the performance of companies is essential to identify improvement potentials in various industries. Due to a competitive environment, this process imposes strong privacy needs, as leaked business secrets can have devastating effects on participating companies. Consequently, related work proposes to protect sensitive input data of companies using secure multi-party computation or homomorphic encryption. However, related work so far does not consider that also the benchmarking algorithm, used in today's applied real-world scenarios to compute all relevant statistics, itself contains significant intellectual property, and thus needs to be protected. Addressing this issue, we present PCB — a practical design for Privacy-preserving Company Benchmarking that utilizes homomorphic encryption and a privacy proxy — which is specifically tailored for realistic real-world applications in which we protect companies' sensitive input data and the valuable algorithms used to compute underlying key performance indicators. We evaluate PCB's performance using synthetic measurements and showcase its applicability alongside an actual company benchmarking performed in the domain of injection molding, covering 48 distinct key performance indicators calculated out of hundreds of different input values. By protecting the privacy of all participants, we enable them to fully profit from the benefits of company benchmarking.}, keywords = {practical encrypted computing; homomorphic encryption; algorithm confidentiality; benchmarking; key performance indicators; industrial application; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-company-benchmarking.pdf}, web_url = {https://eprint.iacr.org/2020/1512}, publisher = {HomomorphicEncryption.org}, booktitle = {Proceedings of the 8th Workshop on Encrypted Computing \& Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event}, event_place = {Virtual Event}, event_date = {December 15, 2020}, ISBN = {978-3-00-067798-4}, DOI = {10.25835/0072999}, reviewed = {1}, author = {Pennekamp, Jan and Sapel, Patrick and Fink, Ina Berenice and Wagner, Simon and Reuter, Sebastian and Hopmann, Christian and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2020_delacadena_trafficsliver, title = {TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting}, year = {2020}, month = {11}, day = {12}, pages = {1971-1985}, abstract = {Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction of packets. By collecting traffic traces at a malicious Tor entry node — one of the weakest adversaries in the attacker model of Tor — a passive eavesdropper can leverage the captured meta-data to reveal the websites visited by a Tor user. As recently shown, WFP is significantly more effective and realistic than assumed. Concurrently, former WFP defenses are either infeasible for deployment in real-world settings or defend against specific WFP attacks only. To limit the exposure of Tor users to WFP, we propose novel lightweight WFP defenses, TrafficSliver, which successfully counter today’s WFP classifiers with reasonable bandwidth and latency overheads and, thus, make them attractive candidates for adoption in Tor. Through user-controlled splitting of traffic over multiple Tor entry nodes, TrafficSliver limits the data a single entry node can observe and distorts repeatable traffic patterns exploited by WFP attacks. We first propose a network-layer defense, in which we apply the concept of multipathing entirely within the Tor network. We show that our network-layer defense reduces the accuracy from more than 98\% to less than 16\% for all state-of-the-art WFP attacks without adding any artificial delays or dummy traffic. We further suggest an elegant client-side application-layer defense, which is independent of the underlying anonymization network. By sending single HTTP requests for different web objects over distinct Tor entry nodes, our application-layer defense reduces the detection rate of WFP classifiers by almost 50 percentage points. Although it offers lower protection than our network-layer defense, it provides a security boost at the cost of a very low implementation overhead and is fully compatible with today’s Tor network.}, keywords = {Traffic Analysis; Website Fingerprinting; Privacy; Anonymous Communication; Onion Routing; Web Privacy}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-delacadena-trafficsliver.pdf}, web_url = {https://github.com/TrafficSliver}, publisher = {ACM}, booktitle = {Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS '20), November 9-13, 2020, Orlando, FL, USA}, event_place = {Virtual Event, USA}, event_date = {November 9-13, 2020}, ISBN = {978-1-4503-7089-9/20/11}, DOI = {10.1145/3372297.3423351}, reviewed = {1}, author = {De la Cadena, Wladimir and Mitseva, Asya and Hiller, Jens and Pennekamp, Jan and Reuter, Sebastian and Filter, Julian and Wehrle, Klaus and Engel, Thomas and Panchenko, Andriy} } @Phdthesis { 2020-rueth-phd-thesis, title = {Measuring the Evolution of the Internet in the Age of Giants}, year = {2020}, month = {11}, web_url = {https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-7660-8}, publisher = {Shaker Verlag}, address = {Shaker Verlag, D{\"u}ren, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {20}, school = {RWTH Aachen University}, type = {Ph.D. Thesis}, ISBN = {978-3-8440-7660-8}, author = {R{\"u}th, Jan} } @Article { 2020-holz-ccr-tls13, title = {Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization}, journal = {ACM SIGCOMM Computer Communications Review (CCR)}, year = {2020}, month = {7}, volume = {50}, number = {3}, pages = {3-15}, note = {Selected for the 'Best of CCR' session at SIGCOMM 2021.}, url = {https://ccronline.sigcomm.org/wp-content/uploads/2020/08/sigcomm-ccr-paper430-with-open-review.pdf}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, DOI = {10.1145/3411740.3411742}, reviewed = {1}, author = {Holz, Ralph and Hiller, Jens and Amann, Johanna and Razaghpanah, Abbas and Jost, Thomas and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver} } @Inproceedings { 2020-schemmel-porse, title = {Symbolic Partial-Order Execution for Testing Multi-Threaded Programs}, year = {2020}, month = {7}, tags = {symbiosys}, url = {https://arxiv.org/pdf/2005.06688.pdf}, web_url2 = {https://arxiv.org/abs/2005.06688}, booktitle = {Computer Aided Verification (CAV 2020)}, event_name = {32nd International Conference on Computer Aided Verification}, DOI = {10.1007/978-3-030-53288-8_18}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Rodr{\'i}guez, C{\'e}sar and Laprell, David and Wehrle, Klaus} } @Inproceedings { 2020-mann-ur-weldseamstudy, title = {Study on weld seam geometry control for connected gas metal arc welding systems}, year = {2020}, month = {6}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf}, booktitle = {Proceedings of the 2020 Internal Conference on Ubiquitous Robots}, event_name = {Internal Conference on Ubiquitous Robots}, event_date = {June 22-26, 2020}, DOI = {10.1109/UR49135.2020.9144839}, reviewed = {1}, author = {Mann, Samuel and Glebke, Ren{\'e} and Kunze, Ike and Scheurenberg, Dominik and Sharma, Rahul and Reisgen, Uwe and Wehrle, Klaus and Abel, Dirk} } @Inproceedings { 2020_roepert_opcua, title = {Assessing the Security of OPC UA Deployments}, year = {2020}, month = {4}, day = {2}, abstract = {To address the increasing security demands of industrial deployments, OPC UA is one of the first industrial protocols explicitly designed with security in mind. However, deploying it securely requires a thorough configuration of a wide range of options. Thus, assessing the security of OPC UA deployments and their configuration is necessary to ensure secure operation, most importantly confidentiality and integrity of industrial processes. In this work, we present extensions to the popular Metasploit Framework to ease network-based security assessments of OPC UA deployments. To this end, we discuss methods to discover OPC UA servers, test their authentication, obtain their configuration, and check for vulnerabilities. Ultimately, our work enables operators to verify the (security) configuration of their systems and identify potential attack vectors.}, tags = {internet-of-production, rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-roepert-opcua-security.pdf}, misc2 = {en}, publisher = {University of T{\"u}bingen}, booktitle = {Proceedings of the 1st ITG Workshop on IT Security (ITSec '20), April 2-3, 2020, T{\"u}bingen, Germany}, event_place = {T{\"u}bingen, Germany}, event_date = {April 2-3, 2020}, DOI = {10.15496/publikation-41813}, reviewed = {1}, author = {Roepert, Linus and Dahlmanns, Markus and Fink, Ina Berenice and Pennekamp, Jan and Henze, Martin} } @Article { 2020_mann_welding_layers, title = {Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers}, journal = {Advanced Structured Materials}, year = {2020}, month = {4}, day = {1}, volume = {125}, pages = {101-118}, abstract = {A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production.}, note = {Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19)}, keywords = {Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy}, tags = {Internet-of-Production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf}, publisher = {Springer}, event_place = {Ponta Delgada, Azores, Portugal}, event_date = {October 24-25, 2019}, ISBN = {978-981-15-2956-6}, ISSN = {1869-8433}, DOI = {10.1007/978-981-15-2957-3_8}, reviewed = {1}, author = {Mann, Samuel and Pennekamp, Jan and Brockhoff, Tobias and Farhang, Anahita and Pourbafrani, Mahsa and Oster, Lukas and Uysal, Merih Seran and Sharma, Rahul and Reisgen, Uwe and Wehrle, Klaus and van der Aalst, Wil} } @Inproceedings { 2020-kosek-tcp-conformance, title = {MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild}, year = {2020}, month = {3}, day = {30}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kosek-tcp-conformance-v2.pdf}, web_url2 = {https://arxiv.org/abs/2002.05400}, publisher = {Springer}, booktitle = {Proceedings of the Passive and Active Measurement Conference (PAM '20)}, event_place = {Eugene, Oregon, USA}, event_name = {Passive and Active Measurement Conference (PAM 2020)}, event_date = {30.03.2020 - 31.03.2020}, language = {en}, DOI = {https://doi.org/10.1007/978-3-030-44081-7_8}, reviewed = {1}, author = {Kosek, Mike and Bl{\"o}cher, Leo and R{\"u}th, Jan and Zimmermann, Torsten and Hohlfeld, Oliver} } @Article { 2020-wehrle-digitalshadows, title = {Mit ''Digitalen Schatten'' Daten verdichten und darstellen : Der Exzellenzcluster ''Internet der Produktion'' forscht {\"u}ber die Produktionstechnik hinaus}, journal = {Der Profilbereich ''Information \& Communication Technology''}, year = {2020}, ISSN = {0179-079X}, DOI = {10.18154/RWTH-2021-02496}, author = {Jarke, Matthias and van der Aalst, Wil and Brecher, Christian and Brockmann, Matthias and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Rumpe, Bernhard and Schuh, G{\"u}nther and Wehrle, Klaus and Ziefle, Martina} } @Article { 2019-kunze-ccwild-tnsm, title = {Congestion Control in the Wild - Investigating Content Provider Fairness}, journal = {IEEE Transactions on Network and Service Management}, year = {2019}, month = {12}, day = {27}, volume = {17}, number = {2}, pages = {1224 - 1238}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-kunze-ccwild-tnsm.pdf}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2019.2962607}, reviewed = {1}, author = {Kunze, Ike and R{\"u}th, Jan and Hohlfeld, Oliver} } @Inproceedings { 2019-glebke-in-network-cv, title = {Towards Executing Computer Vision Functionality on Programmable Network Devices}, year = {2019}, month = {12}, day = {9}, tags = {reflexes,maki,internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)}, language = {en}, ISBN = {978-1-4503-7000-4/19/12}, DOI = {10.1145/3359993.3366646}, reviewed = {1}, author = {Glebke, Ren{\'e} and Krude, Johannes and Kunze, Ike and R{\"u}th, Jan and Senger, Felix and Wehrle, Klaus} } @Inproceedings { 2019-rueth-quic-userstudy, title = {Perceiving QUIC: Do Users Notice or Even Care?}, year = {2019}, month = {12}, tags = {maki,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-quic-userstudy.pdf}, web_url2 = {https://arxiv.org/abs/1910.07729}, publisher = {ACM}, booktitle = {In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '19)}, event_place = {Orlando, Florida, USA}, event_name = {International Conference on emerging Networking EXperiments and Technologies}, event_date = {9.12.2019-12.12.2019}, DOI = {10.1145/3359989.3365416}, reviewed = {1}, author = {R{\"u}th, Jan and Wolsing, Konrad and Wehrle, Klaus and Hohlfeld, Oliver} } @Inproceedings { 2019_pennekamp_multipath, title = {Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing}, year = {2019}, month = {10}, day = {7}, abstract = {Users of an onion routing network, such as Tor, depend on its anonymity properties. However, especially malicious entry nodes, which know the client’s identity, can also observe the whole communication on their link to the client and, thus, conduct several de-anonymization attacks. To limit this exposure and to impede corresponding attacks, we propose to multipath traffic between the client and the middle node to reduce the information an attacker can obtain at a single vantage point. To facilitate the deployment, only clients and selected middle nodes need to implement our approach, which works transparently for the remaining legacy nodes. Furthermore, we let clients control the splitting strategy to prevent any external manipulation.}, note = {Poster Session}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-multipathing.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP '19), October 7-10, 2019, Chicago, IL, USA}, event_place = {Chicago, IL, USA}, event_name = {27th IEEE International Conference on Network Protocols (ICNP 2019)}, event_date = {7-10. Oct. 2019}, ISBN = {978-1-7281-2700-2}, ISSN = {2643-3303}, DOI = {10.1109/ICNP.2019.8888029}, reviewed = {1}, author = {Pennekamp, Jan and Hiller, Jens and Reuter, Sebastian and De la Cadena, Wladimir and Mitseva, Asya and Henze, Martin and Engel, Thomas and Wehrle, Klaus and Panchenko, Andriy} } @Inproceedings { 2019-sander-depcci, title = {DeePCCI: Deep Learning-based Passive Congestion Control Identification}, year = {2019}, month = {8}, day = {18}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf}, web_url2 = {https://arxiv.org/abs/1907.02323}, publisher = {ACM}, booktitle = {In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI \& ML (NetAI '19)}, event_place = {Beijing, China}, event_name = {Workshop on Network Meets AI \& ML}, event_date = {18.08.2019}, DOI = {10.1145/3341216.3342211}, reviewed = {1}, author = {Sander, Constantin and R{\"u}th, Jan and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2019-wolsing-quicperf, title = {A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC}, year = {2019}, month = {7}, day = {22}, tags = {maki,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-wolsing-quicperf.pdf}, web_url2 = {https://arxiv.org/abs/1906.07415}, publisher = {ACM}, booktitle = {In Proceedings of the Applied Networking Research Workshop (ANRW '19)}, event_place = {Montreal, Quebec, Canada}, event_name = {Applied Networking Research Workshop at IETF-105}, event_date = {2019-07-22}, DOI = {10.1145/3340301.3341123}, reviewed = {1}, author = {Wolsing, Konrad and R{\"u}th, Jan and Wehrle, Klaus and Hohlfeld, Oliver} } @Inproceedings { 2019-hohlfeld-bpfperf, title = {Demystifying the Performance of XDP BPF}, year = {2019}, month = {6}, day = {25}, tags = {maki,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-bpfperf.pdf}, publisher = {IEEE}, booktitle = {IEEE International Conference on Network Softwarization (NetSoft)}, event_name = {IEEE International Conference on Network Softwarization}, DOI = {10.1109/NETSOFT.2019.8806651}, reviewed = {1}, author = {Hohlfeld, Oliver and Krude, Johannes and Reelfs, Jens Helge and R{\"u}th, Jan and Wehrle, Klaus} } @Inproceedings { 2019-rueth-ccfness, title = {An Empirical View on Content Provider Fairness}, year = {2019}, month = {6}, day = {19}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-ccfness.pdf}, web_url2 = {https://arxiv.org/abs/1905.07152}, publisher = {IFIP/IEEE}, booktitle = {In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '19)}, event_place = {Paris, France}, event_name = {Network Traffic Measurement and Analysis Conference}, event_date = {19.06.2019 - 21.06.2019}, DOI = {10.23919/TMA.2019.8784684}, reviewed = {1}, author = {R{\"u}th, Jan and Kunze, Ike and Hohlfeld, Oliver} } @Inproceedings { ReelfsMHH2019, title = {Hashtag Usage in a Geographically-Local Microblogging App}, year = {2019}, month = {5}, day = {13}, pages = {919-927}, keywords = {Anonymous Messaging; Location Based Messaging; User Behavior and Engagement; Information Diffusion; Hashtag}, tags = {comtex}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-reelfs-jodel-hashtags.pdf}, publisher = {ACM}, booktitle = {Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), 9th International Workshop on Location and the Web (LocWeb '19), May 13–17, 2019, San Francisco, CA, USA}, event_place = {San Francisco, California, USA}, event_name = {International Workshop on Location and the Web}, event_date = {May 13–17, 2019}, ISBN = {978-1-4503-6675-5/19/05}, DOI = {10.1145/3308560.3316537}, reviewed = {1}, author = {Reelfs, Helge and Mohaupt, Timon and Hohlfeld, Oliver and Henckell, Niklas} } @Inproceedings { 2019_pennekamp_infrastructure, title = {Towards an Infrastructure Enabling the Internet of Production}, year = {2019}, month = {5}, day = {8}, pages = {31-37}, abstract = {New levels of cross-domain collaboration between manufacturing companies throughout the supply chain are anticipated to bring benefits to both suppliers and consumers of products. Enabling a fine-grained sharing and analysis of data among different stakeholders in an automated manner, such a vision of an Internet of Production (IoP) introduces demanding challenges to the communication, storage, and computation infrastructure in production environments. In this work, we present three example cases that would benefit from an IoP (a fine blanking line, a high pressure die casting process, and a connected job shop) and derive requirements that cannot be met by today’s infrastructure. In particular, we identify three orthogonal research objectives: (i) real-time control of tightly integrated production processes to offer seamless low-latency analysis and execution, (ii) storing and processing heterogeneous production data to support scalable data stream processing and storage, and (iii) secure privacy-aware collaboration in production to provide a basis for secure industrial collaboration. Based on a discussion of state-of-the-art approaches for these three objectives, we create a blueprint for an infrastructure acting as an enabler for an IoP.}, keywords = {Internet of Production; Cyber-Physical Systems; Data Processing; Low Latency; Secure Industrial Collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-iop-infrastructure.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '19), May 6-9, 2019, Taipei, TW}, event_place = {Taipei, TW}, event_date = {May 6-9, 2019}, ISBN = {978-1-5386-8500-6/19}, DOI = {10.1109/ICPHYS.2019.8780276}, reviewed = {1}, author = {Pennekamp, Jan and Glebke, Ren{\'e} and Henze, Martin and Meisen, Tobias and Quix, Christoph and Hai, Rihan and Gleim, Lars and Niemietz, Philipp and Rudack, Maximilian and Knape, Simon and Epple, Alexander and Trauth, Daniel and Vroomen, Uwe and Bergs, Thomas and Brecher, Christian and B{\"u}hrig-Polaczek, Andreas and Jarke, Matthias and Wehrle, Klaus} } @Techreport { 2019-rueth-blitzstart, title = {Blitz-starting QUIC Connections}, year = {2019}, month = {5}, day = {8}, number2 = {arXiv:1905.03144 [cs.NI]}, pages = {1--8}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf}, web_url = {https://arxiv.org/abs/1905.03144}, misc2 = {Online}, publisher = {COMSYS, RWTH Aachen University}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {COMSYS, RWTH Aachen University}, type = {Technical Report}, language = {en}, author = {R{\"u}th, Jan and Wolsing, Konrad and Serror, Martin and Wehrle, Klaus and Hohlfeld, Oliver} } @Techreport { 2019-hohlfeld-santa-tr, title = {Application-Agnostic Offloading of Packet Processing}, year = {2019}, month = {4}, day = {1}, number2 = {arXiv:1904.00671 [cs.NI]}, pages = {1--14}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf}, web_url = {https://arxiv.org/abs/1904.00671}, misc2 = {Online}, publisher = {COMSYS, RWTH Aachen University}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {COMSYS, RWTH Aachen University}, type = {Technical Report}, language = {en}, author = {Hohlfeld, Oliver and Reelfs, Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2019-rueth-icmp, title = {Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet’s Control Plane}, year = {2019}, month = {3}, day = {27}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-icmp.pdf}, web_url2 = {https://arxiv.org/abs/1901.07265}, publisher = {Springer}, booktitle = {In Proceedings of the Passive and Active Measurement Conference (PAM '19)}, event_place = {Puerto Varas, Chile}, event_name = {Passive and Active Measurement Conference (PAM 2019)}, event_date = {27.3.2018 - 29.3.2018}, language = {en}, DOI = {10.1007/978-3-030-15986-3_4}, reviewed = {1}, author = {R{\"u}th, Jan and Zimmermann, Torsten and Hohlfeld, Oliver} } @Inproceedings { 2019-glebke-wirelessgain, title = {Enabling Wireless Network Support for Gain Scheduled Control}, year = {2019}, month = {3}, day = {25}, tags = {reflexes,spp}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf}, publisher = {ACM}, booktitle = {In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)}, event_place = {Dresden, Germany}, event_name = {International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)}, event_date = {25.03.2019}, DOI = {10.1145/3301418.3313943}, reviewed = {1}, author = {Gallenm{\"u}ller, Sebastian and Glebke, Ren{\'e} and G{\"u}nther, Stephan and Hauser, Eric and Leclaire, Maurice and Reif, Stefan and R{\"u}th, Jan and Schmidt, Andreas and Carle, Georg and Herfet, Thorsten and Schr{\"o}der-Preikschat, Wolfgang and Wehrle, Klaus} } @Article { rueth:iw:TNSM19, title = {TCP’s Initial Window – Deployment in the Wild and its Impact on Performance}, journal = {IEEE Transactions on Network and Service Management}, year = {2019}, month = {1}, day = {30}, volume = {16}, number = {2}, pages = {389--402}, tags = {maki}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-iwtnsm.pdf}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2019.2896335}, reviewed = {1}, author = {R{\"u}th, Jan and Kunze, Ike and Hohlfeld, Oliver} } @Proceedings { 2018-QuicTesting, title = {Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution}, year = {2018}, month = {12}, day = {4}, tags = {erc,symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rath-quictesting.pdf}, web_url = {https://dl.acm.org/citation.cfm?id=3284853}, web_url2 = {https://arxiv.org/abs/1811.12099}, publisher = {ACM}, event_place = {Heraklion, Greece}, event_name = {EPIQ'18 Workshop Paper}, event_date = {4.12.2018}, language = {en}, ISBN = {978-1-4503-6082-1}, DOI = {10.1145/3284850.3284853}, reviewed = {1}, author = {Rath, Felix and Schemmel, Daniel and Wehrle, Klaus} } @Inproceedings { 2018-rueth-mining, title = {Digging into Browser-based Crypto Mining}, year = {2018}, month = {10}, day = {31}, tags = {maki,internet-measurements}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf}, web_url2 = {https://arxiv.org/abs/1808.00811}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '18)}, event_place = {Boston, US}, event_name = {Internet Measurement Conference 2018}, event_date = {31.10.18 - 2.11.18}, language = {en}, DOI = {10.1145/3278532.3278539}, reviewed = {1}, author = {R{\"u}th, Jan and Zimmermann, Torsten and Wolsing, Konrad and Hohlfeld, Oliver} } @Inproceedings { 2018-hiller-lcn-lowlatencyiiot, title = {Secure Low Latency Communication for Constrained Industrial IoT Scenarios}, year = {2018}, month = {10}, tags = {connect,iop,nerd-nrw}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-lcn-secure_low_latency_communication_iiot.pdf}, publisher = {IEEE}, booktitle = {43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA}, event_place = {Chicago, USA}, event_name = {43nd IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 1-4, 2018}, language = {en}, ISBN = {978-1-5386-4413-3}, DOI = {10.1109/LCN.2018.8638027}, reviewed = {1}, author = {Hiller, Jens and Henze, Martin and Serror, Martin and Wagner, Eric and Richter, Jan Niklas and Wehrle, Klaus} } @Inproceedings { 2018-hohlfeld-santa, title = {Application-Agnostic Offloading of Datagram Processing}, year = {2018}, month = {9}, day = {3}, tags = {maki,ssiclops,reflexes}, url = {https://ieeexplore.ieee.org/document/8493053}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {International Teletraffic Congress ITC 30}, event_date = {03.09.2018 - 07-09.2018}, language = {en}, DOI = {10.1109/ITC30.2018.00015}, reviewed = {1}, author = {Hohlfeld, Oliver and Reelfs, Jens Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2018-rueth-reflexnetcompute, title = {Towards In-Network Industrial Feedback Control}, year = {2018}, month = {8}, day = {20}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexnetcompute.pdf}, publisher = {ACM}, booktitle = {Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute '18)}, event_place = {Budapest, Hungary}, event_name = {ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute 2018)}, event_date = {20.08.2018}, DOI = {10.1145/3229591.3229592}, reviewed = {1}, author = {R{\"u}th, Jan and Glebke, Ren{\'e} and Wehrle, Klaus and Causevic, Vedad and Hirche, Sandra} } @Inproceedings { 2018-rueth-iwcdns, title = {Demystifying TCP Initial Window Configurations of Content Distribution Networks}, year = {2018}, month = {6}, day = {26}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-iwcdns.pdf}, web_url = {https://arxiv.org/abs/1902.08937}, web_url2 = {http://tma.ifip.org/2018/wp-content/uploads/sites/3/2018/06/tma2018_paper13.pdf}, booktitle = {In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18)}, event_place = {Vienna, Austria}, event_name = {Network Traffic Measurement and Analysis Conference (TMA'18)}, event_date = {26.06.2018 - 29.06.2018}, DOI = {10.23919/TMA.2018.8506549}, reviewed = {1}, author = {R{\"u}th, Jan and Hohlfeld, Oliver} } @Inproceedings { 2018-rueth-reflexdemo, title = {Demo: Towards In-Network Processing for Low-Latency Industrial Control}, year = {2018}, month = {4}, day = {15}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-reflexdemo.pdf}, publisher = {IEEE Computer Society}, booktitle = {In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications}, event_place = {Honolulu, HI, USA}, event_name = {International Conference on Computer Communications (INFOCOM)}, event_date = {15.04.2018 - 19.04.2018}, language = {en}, DOI = {10.1109/INFCOMW.2018.8406844}, reviewed = {1}, author = {R{\"u}th, Jan and Glebke, Ren{\'e} and Ulmen, Tanja and Wehrle, Klaus} } @Inproceedings { 2018-rueth-quicadoptionstudy, title = {A First Look at QUIC in the Wild}, year = {2018}, month = {3}, day = {26}, pages = {255-268}, tags = {maki,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-quicadoptionstudy.pdf}, web_url2 = {https://arxiv.org/abs/1801.05168}, publisher = {Springer, Cham}, booktitle = {In Proceedings of the Passive and Active Measurement Conference (PAM '18)}, event_place = {Berlin, Germany}, event_name = {Passive and Active Measurement Conference (PAM 2018)}, event_date = {26.3.2018 - 27.3.2018}, language = {en}, ISBN = {978-3-319-76481-8}, DOI = {10.1007/978-3-319-76481-8_19}, reviewed = {1}, author = {R{\"u}th, Jan and Poese, Ingmar and Dietzel, Christoph and Hohlfeld, Oliver} } @Inproceedings { 2018-tzimmermann-metacdn, title = {Characterizing a Meta-CDN}, year = {2018}, month = {3}, day = {26}, pages = {114-128}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf}, web_url = {https://arxiv.org/abs/1803.09990}, publisher = {Springer, Cham}, booktitle = {In Proceedings of the Passive and Active Measurement Conference (PAM '18)}, event_place = {Berlin, Germany}, event_name = {Passive and Active Measurement Conference (PAM 2018)}, event_date = {26.3.2018 - 27.3.2018}, language = {en}, ISBN = {978-3-319-76480-1}, DOI = {10.1007/978-3-319-76481-8_9}, reviewed = {1}, author = {Hohlfeld, Oliver and R{\"u}th, Jan and Wolsing, Konrad and Zimmermann, Torsten} } @Inproceedings { 2018-tzimmermann-split, title = {SPLIT: Smart Protocol Loading for the IoT}, year = {2018}, month = {2}, day = {14}, tags = {iop}, url = {https://jenshiller.com/publication/2018-zimmermann-ewsn-split/2018-zimmermann-ewsn-split.pdf}, web_url = {https://dl.acm.org/citation.cfm?id=3234847.3234854}, publisher = {ACM}, booktitle = {Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain}, event_place = {Madrid, Spain}, event_name = {European Conference on Wireless Sensor Networks (EWSN 2018)}, event_date = {14.2.2018 - 16.2.2018}, language = {en}, ISBN = {978-0-9949886-2-1}, reviewed = {1}, author = {Zimmermann, Torsten and Hiller, Jens and Reelfs, Jens Helge and Hein, Pascal and Wehrle, Klaus} } @Inproceedings { 2017-poormohammady, title = {Dynamic Algorithm Selection for the Logic of Tasks in IoT Stream Processing Systems}, journal = {13th International Conference on Network and Service Management}, year = {2017}, month = {11}, day = {26}, misc2 = {Online}, publisher = {IEEE}, booktitle = {13th International Conference on Network and Service Management, Tokyo, Japan}, language = {en}, DOI = {10.23919/CNSM.2017.8256009}, reviewed = {1}, author = {Poormohammady, Ehsan and Reelfs, Jens Helge and Stoffers, Mirko and Wehrle, Klaus and Papageorgiou, Apostolos} } @Inproceedings { 2017-rueth-iwmeasure, title = {Large-Scale Scanning of TCP’s Initial Window}, year = {2017}, month = {11}, day = {1}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rueth-iwmeasure.pdf}, publisher = {ACM}, booktitle = {In Proceedings of the Internet Measurement Conference (IMC '17)}, event_place = {London, UK}, event_name = {Proceedings of the 2017 Internet Measurement Conference}, event_date = {01.11.2017 - 03.11.2017}, language = {en}, DOI = {10.1145/3131365.3131370}, reviewed = {1}, author = {R{\"u}th, Jan and Bormann, Christian and Hohlfeld, Oliver} } @Conference { 2017-fink-brainlab-gmds, title = {BrainLab - Ein Framework f{\"u}r mobile neurologische Untersuchungen}, year = {2017}, month = {8}, day = {29}, note = {Best Abstract Award}, web_url = {https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml}, web_url_date = {06.09.19}, publisher = {German Medical Science GMS Publishing House (2017)}, booktitle = {62. Jahrestagung der Deutschen Gesellschaft f{\"u}r Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS).}, event_place = {Oldenburg}, event_name = {GMDS 2017}, event_date = {17-21 September 2017}, DOI = {10.3205/17gmds137}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinski, Thomas and Titgemeyer, Yannic and Ramos, Roann and Kutafina, Ekaterina and Bitsch, J{\'o} Agila and Jonas, Stephan Michael} } @Proceedings { 2017-SymPerfPoster, title = {SymPerf: Predicting Network Function Performance}, year = {2017}, month = {8}, day = {21}, tags = {spp,erc,symbiosys,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf}, publisher = {ACM}, event_place = {Los Angeles, USA}, event_name = {ACM SIGCOMM 2017 Poster}, event_date = {21.8.2017 - 25.8.2017}, language = {en}, ISBN = {978-1-4503-5057-0/17/08}, DOI = {10.1145/3123878.3131977}, reviewed = {1}, author = {Rath, Felix and Krude, Johannes and R{\"u}th, Jan and Schemmel, Daniel and Hohlfeld, Oliver and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2017-zimmermann-networking-http2, title = {How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push}, year = {2017}, month = {6}, day = {12}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-zimmermann-networking-push.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 16th International IFIP Networking Conference (NETWORKING'17), Stockholm, Sweden}, event_place = {Stockholm, Sweden}, event_name = {IFIP Networking 2017}, event_date = {12.-16.6.2017}, ISBN = {978-3-901882-94-4}, DOI = {10.23919/IFIPNetworking.2017.8264830}, reviewed = {1}, author = {Zimmermann, Torsten and R{\"u}th, Jan and Wolters, Benedikt and Hohlfeld, Oliver} } @Article { dombrowski-vdi, title = {Funktechnologien f{\"u}r Industrie 4.0}, journal = {VDE Positionspapier}, year = {2017}, month = {6}, day = {1}, publisher = {VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.}, address = {Stresemannallee 15, 60596 Frankfurt am Main, Germany}, author = {Aktas, Ismet and Bentkus, Alexander and Bonanati, Florian and Dekorsy, Armin and Dombrowski, Christian and Doubrava, Michael and Golestani, Ali and Hofmann, Frank and Heidrich, Mike and Hiensch, Stefan and Kays, R{\"u}diger and Meyer, Michael and M{\"u}ller, Andreas and ten Brink, Stephan and Petreska, Neda and Popovic, Milan and Rauchhaupt, Lutz and Saad, Ahmad and Schotten, Hans and W{\"o}ste, Christoph and Wolff, Ingo} } @Conference { 2017-fink-brainlab, title = {BrainLab – towards mobile brain research}, year = {2017}, month = {4}, day = {24}, pages = {2}, url = {/fileadmin/papers/2017/2017-fink-brainlab.pdf}, web_url2 = {http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf}, web_url2_date = {2017-05-09}, misc2 = {Online}, booktitle = {Informatics for Health 2017, Manchester UK}, event_place = {Manchester, UK}, event_name = {Informatics for Health 2017, Manchester UK}, event_date = {24-26 April 2017}, language = {en}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinsky, Thomas and Ramos, Roann and Kutafina, Ekaterina and Bitsch Link, J{\'o} Agila and Jonas, Stephan} } @Inproceedings { 2017-ziegeldorf-codaspy-priward, title = {Privacy-Preserving HMM Forward Computation}, year = {2017}, month = {3}, day = {22}, pages = {83-94}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-codaspy-priward.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, USA}, language = {en}, ISBN = {978-1-4503-4523-1}, DOI = {10.1145/3029806.3029816}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Metzke, Jan and R{\"u}th, Jan and Henze, Martin and Wehrle, Klaus} } @Incollection { 2016-iiot-rueth-comm, title = {Communication and Networking for the Industrial Internet of Things}, year = {2017}, pages = {317-346}, misc2 = {Online}, editor = {Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B.}, publisher = {Springer}, booktitle = {Industrial Internet of Things}, language = {en}, ISBN = {978-3-319-42558-0}, DOI = {10.1007/978-3-319-42559-7_12}, reviewed = {1}, author = {R{\"u}th, Jan and Schmidt, Florian and Serror, Martin and Wehrle, Klaus and Zimmermann, Torsten} } @Inproceedings { 2016-henze-cloudcom-trinics, title = {Towards Transparent Information on Individual Cloud Service Usage}, year = {2016}, month = {12}, day = {12}, pages = {366-370}, tags = {trinics}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg}, language = {en}, ISBN = {978-1-5090-1445-3}, DOI = {10.1109/CloudCom.2016.0064}, reviewed = {1}, author = {Henze, Martin and Kerpen, Daniel and Hiller, Jens and Eggert, Michael and Hellmanns, David and M{\"u}hmer, Erik and Renuli, Oussama and Maier, Henning and St{\"u}ble, Christian and H{\"a}u{\ss}ling, Roger and Wehrle, Klaus} } @Inproceedings { 2016-matzutt-ccs-bitcoin, title = {POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store}, year = {2016}, month = {10}, day = {24}, pages = {1769-1771}, tags = {mynedata}, url = {/fileadmin/papers/2016/2016-matzutt-ccs-blockchaincontent.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria}, language = {en}, ISBN = {978-1-4503-4139-4}, DOI = {10.1145/2976749.2989059}, reviewed = {1}, author = {Matzutt, Roman and Hohlfeld, Oliver and Henze, Martin and Rawiel, Robin and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Article { 2015-cheng-piap-jmu, title = {Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening}, journal = {JMIR Mhealth Uhealth}, year = {2016}, month = {7}, day = {20}, volume = {4}, number = {3}, pages = {e88}, tags = {piap}, web_url = {http://mhealth.jmir.org/2016/3/e88/}, web_url2 = {http://www.ncbi.nlm.nih.gov/pubmed/27439444}, misc2 = {Online}, language = {en}, ISSN = {2291-5222}, DOI = {10.2196/mhealth.5284}, reviewed = {1}, author = {Cheng, Paula Glenda Ferrer and Ramos, Roann Munoz and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael and Ix, Tim and See, Portia Lynn Quetulio and Wehrle, Klaus} } @Inproceedings { 2016-ramos-inpact-lexicon, title = {How Do I Say ''Sad?'' Building a Depression-Lexicon for Psychologist in a Pocket}, year = {2016}, month = {4}, day = {30}, pages = {1--6}, note = {29\% Acceptance rate}, url = {/fileadmin/misc/2016/2016-ramos-inpact-lexicon.pdf}, web_url2 = {http://inpact-psychologyconference.org/2016/conference-program/}, misc2 = {Online}, editor = {Clara Pracana and Michael Wang}, publisher = {World Institute for Advanced Research and Science}, address = {Lisbon, Portugal}, booktitle = {Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)}, event_place = {Lisbon, Portugal}, event_name = {International Psychological Applications Conference and Trends (InPACT 2016)}, event_date = {April 30 -- May 2, 2016}, language = {en}, ISBN = {978-989-99389-6-0}, reviewed = {1}, author = {Ramos, Roann Munoz and Cheng, Paula Glenda Ferrer and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael} } @Inproceedings { 2016-ramos-inpact-feeling-meh, title = {Feeling Meh: Psychologist in a pocket app for depression screening}, year = {2016}, month = {4}, day = {30}, pages = {1--4}, note = {29\% Acceptance rate}, url = {/fileadmin/misc/2016/2016-ramos-inpact-feeling-meh.pdf}, web_url2 = {http://inpact-psychologyconference.org/2016/conference-program/}, misc2 = {Online}, editor = {Clara Pracana and Michael Wang}, publisher = {World Institute for Advanced Research and Science}, address = {Lisbon, Portugal}, booktitle = {Proceedings of the International Psychological Applications Conference and Trends (InPACT 2016)}, event_place = {Lisbon, Portugal}, event_name = {International Psychological Applications Conference and Trends (InPACT 2016)}, event_date = {April 30 -- May 2, 2016}, language = {en}, ISBN = {978-989-99389-6-0}, reviewed = {1}, author = {Ramos, Roann Munoz and Cheng, Paula Glenda Ferrer and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael} } @Article { 2016-fgcs-henze-iotprivacy, title = {A Comprehensive Approach to Privacy in the Cloud-based Internet of Things}, journal = {Future Generation Computer Systems}, year = {2016}, month = {3}, volume = {56}, pages = {701-718}, tags = {ipacs}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-fgcs-iotprivacy.pdf}, misc2 = {Online}, publisher = {Elsevier}, language = {en}, ISSN = {0167-739X}, DOI = {10.1016/j.future.2015.09.016}, reviewed = {1}, author = {Henze, Martin and Hermerschmidt, Lars and Kerpen, Daniel and H{\"a}u{\ss}ling, Roger and Rumpe, Bernhard and Wehrle, Klaus} } @Inproceedings { 2016-zimmermann-wons-mirco, title = {Maintaining Integrity and Reputation in Content Offloading}, year = {2016}, month = {1}, pages = {25-32}, tags = {maki}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-zimmermann-wons-mirco.pdf}, publisher = {IEEE}, booktitle = {12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy}, event_place = {Cortina d'Ampezzo, Italy}, event_name = {12th International Conference on Wireless On-demand Network Systems and Services (WONS)}, event_date = {January 20 - 22 2016}, language = {en}, ISBN = {978-3-901882-80-7}, reviewed = {1}, author = {Zimmermann, Torsten and R{\"u}th, Jan and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 2015-wirtz-secon, title = {Enabling Ubiquitous Interaction with Smart Things}, year = {2015}, month = {6}, day = {24}, pages = {256-264}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf}, web_url = {http://www.comsys.rwth-aachen.de/short/secon15-stif}, misc2 = {Online}, publisher = {IEEE}, booktitle = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA}, event_place = {Seattle, USA}, event_name = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015)}, event_date = {22.06.2015 - 25.06.2015}, language = {en}, DOI = {10.1109/SAHCN.2015.7338324}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Serror, Martin and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2015-bitsch-phealth-piap, title = {Psychologist in a Pocket: Towards Depression Screening on Mobile Phones}, year = {2015}, month = {6}, day = {2}, volume = {211}, pages = {153 --159}, abstract = {Depression is the most prevalent clinical disorder and one of the main causes of disability. This makes early detection of depressive symptoms critical in its prevention and management. This paper presents and discusses the development of Psychologist in a Pocket (PiaP), a mental mHealth application for Android which screens and monitors for these symptoms, and–given the explicit permission of the user–alerts a trusted contact such as the mental health professional or a close friend, if it detects symptoms. All text inputted electronically–such as short message services, emails, social network posts–is analyzed based on keywords related to depression based on DSM-5 and ICD criteria as well as Beck's Cognitive Theory of Depression and the Self-Focus Model. Data evaluation and collection happen in the background, on- device, without requiring any user involvement. Currently, the application is in an early prototype phase entering initial clinical validation.}, url = {fileadmin/papers/2015/2015-bitsch-phealth-piap.pdf}, misc = {Print}, editor = {Blobel, Bernd and Lind{\'e}n, Maria and Ahmed, Mobyen Uddin}, publisher = {IOS Press}, address = {Amsterdam}, series = {Studies in Health Technology and Informatics}, booktitle = {Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_place = {V{\"a}ster{\aa}s, Sweden}, event_name = {12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_date = {June 2-4, 2015}, language = {en}, ISBN = {978-1-61499-515-9}, ISSN = {0926-9630}, DOI = {10.3233/978-1-61499-516-6-153}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Ix, Tim and Ferrer Cheng, Paula Glenda and Wehrle, Klaus} } @Inproceedings { 2015-bitsch-phealth-brain, title = {Towards Brain Research in a Pocket: Bringing EEG Research and Diagnostics out of the Lab}, year = {2015}, month = {6}, day = {2}, volume = {211}, pages = {185 -- 190}, abstract = {Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment. We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach.}, url = {fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf}, misc = {Print}, editor = {Blobel, Bernd and Lind{\'e}n, Maria and Ahmed, Mobyen Uddin}, publisher = {IOS Press}, address = {Amsterdam}, series = {Studies in Health Technology and Informatics}, booktitle = {Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_place = {V{\"a}ster{\aa}s, Sweden}, event_name = {12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_date = {June 2-4, 2015}, language = {en}, ISBN = {978-1-61499-515-9}, ISSN = {0926-9630}, DOI = {10.3233/978-1-61499-516-6-185}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Severijns, Cassandra and Wehrle, Klaus} } @Incollection { 2013-wtc-eggert-sensorcloud, title = {SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators}, year = {2014}, month = {12}, day = {14}, pages = {203-218}, tags = {sensorcloud}, url = {fileadmin/papers/2013/2013-wtc-eggert-sensorcloud.pdf}, misc2 = {Online}, editor = {Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard}, publisher = {Springer}, booktitle = {Trusted Cloud Computing}, language = {en}, ISBN = {978-3-319-12717-0}, DOI = {10.1007/978-3-319-12718-7_13}, reviewed = {1}, author = {Eggert, Michael and H{\"a}u{\ss}ling, Roger and Henze, Martin and Hermerschmidt, Lars and Hummen, Ren{\'e} and Kerpen, Daniel and Navarro P{\'e}rez, Antonio and Rumpe, Bernhard and Thi{\ss}en, Dirk and Wehrle, Klaus} } @Inproceedings { 2014-wirtz-mum-dcmv, title = {Facilitating Direct and Ubiquitous Mobile Computer Vision}, year = {2014}, month = {11}, day = {27}, url = {fileadmin/papers/2014/2014-wirtz-mum-mcv.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014), Melbourne, Australia}, event_place = {Melbourne, Australia}, event_name = {The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014)}, language = {en}, ISBN = {978-1-4503-3304-7}, DOI = {10.1145/2677972.2677974}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Wehrle, Klaus} } @Inproceedings { 2014-chants-wirtz-disco, title = {Opportunistic Interaction in the Challenged Internet of Things}, year = {2014}, month = {9}, day = {7}, pages = {1-8}, url = {fileadmin/papers/2014/2014-wirtz-chants-challenged_iot.pdf}, misc2 = {online}, publisher = {ACM}, booktitle = {Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, USA}, event_place = {Maui, Hawaii, USA}, event_name = {Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014)}, event_date = {7 September 2014}, language = {en}, ISBN = {978-1-4503-3071-8}, DOI = {10.1145/2645672.2645679}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Serror, Martin and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2014-ficloud-henze-upecsi, title = {User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things}, year = {2014}, month = {8}, day = {27}, pages = {191-196}, tags = {ipacs}, url = {/fileadmin/papers/2014/2014-ficloud-henze-upecsi.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014)}, language = {en}, ISBN = {978-1-4799-4357-9}, DOI = {10.1109/FiCloud.2014.38}, reviewed = {1}, author = {Henze, Martin and Hermerschmidt, Lars and Kerpen, Daniel and H{\"a}u{\ss}ling, Roger and Rumpe, Bernhard and Wehrle, Klaus} } @Inproceedings { 2014-bitsch-extremecom-demo, title = {Demo: Opportunistic Mobile Brain Research}, year = {2014}, month = {8}, day = {14}, pages = {1--2}, abstract = {The majority of research using brain imaging and EEG techniques is currently limited to clinical environments, restricting experiments to synthetic tasks in controlled conditions. Lifting these limitations brought about by this artificial set-up would allow us to perform neuropsychological assessments and research in mobile settings or at locations easier accessible to patients, possibly even in remote, hard to access areas. We developed a tablet based mobile framework to present auditory and visual stimuli, capture wireless commercial EEG and screen interaction data, and analyze the recorded data for immediate evaluation, as well as share the data over internet or local opportunistic links. To demonstrate the feasibility of our approach, we successfully replicated the experimental set-up and evaluation pipeline of two existing EEG studies on event-related potentials. This work therefore lays the foundation to further truly mobile brain research and health-care applications.}, url = {fileadmin/papers/2014/2014-bitsch-extremcom-mobile-eeg-demo.pdf}, misc = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 6th Extreme Conference on Communication}, event_place = {Galapagos Islands, Ecuador}, event_name = {6th Extreme Conference on Communication}, event_date = {August 11-15, 2014}, language = {en}, ISBN = {978-1-4503-2929-3}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Orlea, David and Wehrle, Klaus} } @Inproceedings { 2014-hummen-delegation, title = {Delegation-based Authentication and Authorization for the IP-based Internet of Things}, year = {2014}, month = {6}, day = {30}, pages = {284-292}, tags = {iotsec; sensorcloud}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014)}, event_place = {Singapore}, event_name = {11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014)}, event_date = {30.06. - 03.07.2014}, language = {en}, DOI = {10.1109/SAHCN.2014.6990364}, reviewed = {1}, author = {Hummen, Ren{\'e} and Shafagh, Hossein and Raza, Shahid and Voigt, Thiemo and Wehrle, Klaus} } @Inproceedings { 2014-mobisys-rueth-uiso, title = {Demo: Ubiquitous Interaction with Smart Objects}, year = {2014}, month = {6}, pages = {355-356}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-rueth-mobisys-uiso.pdf}, web_url = {http://www.comsys.rwth-aachen.de/short/mobisys14-demo}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14), Bretton Woods, New Hampshire, USA}, event_place = {Bretton Woods}, event_name = {12th Annual International Conference on Mobile Systems, Applications, and Services}, event_date = {16-19 June 2014}, language = {en}, ISBN = {978-1-4503-2793-0}, DOI = {10.1145/2594368.2601477}, reviewed = {1}, author = {R{\"u}th, Jan and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 2014-mmsys-wirtz-ubifi, title = {A Wireless Application Overlay for Ubiquitous Mobile Multimedia Sensing and Interaction}, year = {2014}, month = {3}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-wirtz-mmsys-ubifi.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore}, event_place = {Singapore}, event_name = {5th ACM Multimedia Systems Conference}, event_date = {19-21 March 2014}, language = {en}, ISBN = {978-1-4503-2705-3}, DOI = {10.1145/2557642.2578224}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Zimmermann, Torsten and Ceriotti, Matteo and Wehrle, Klaus} } @Article { 2013-raza-lithe, title = {Lithe: Lightweight Secure CoAP for the Internet of Things}, journal = {IEEE Sensors Journal}, year = {2013}, month = {10}, volume = {13}, number = {10}, pages = {3711-3720}, keywords = {Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security}, tags = {iotsec}, language = {en}, ISSN = {1530-437X}, DOI = {10.1109/JSEN.2013.2277656}, reviewed = {1}, author = {Raza, Shahid and Shafagh, Hossein and Hewage, Kasun and Hummen, Ren{\'e} and Voigt, Thiemo} } @Inproceedings { 2013-chants-wirtz-heaven, title = {Interest-based Cloud-facilitated Opportunistic Networking}, year = {2013}, month = {9}, day = {30}, pages = {1--8}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013)}, event_date = {30 September 2013}, language = {en}, ISBN = {978-1-4503-2363-5}, DOI = {10.1145/2505494.2505504}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2013-hummen-towards, title = {Towards Viable Certificate-based Authentication for the Web of Things}, year = {2013}, month = {4}, day = {19}, tags = {iotsec}, url = {fileadmin/papers/2013/2013-hummen-towards.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)}, event_place = {Budapest, Hungary}, event_name = {2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy}, language = {en}, ISBN = {978-1-4503-2003-0}, DOI = {10.1145/2463183.2463193}, reviewed = {1}, author = {Hummen, Ren{\'e} and Ziegeldorf, Jan Henrik and Shafagh, Hossein and Raza, Shahid and Wehrle, Klaus} } @Inproceedings { 2012-IPIN-Viol-HMM, title = {Hidden Markov Model-based 3D Path-matching using Raytracing-generated Wi-Fi Models}, year = {2012}, month = {11}, day = {13}, pages = {1--10}, url = {fileadmin/papers/2012/2012-11-viol-ipin.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6418873\&tag=1}, misc2 = {Online}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-1-4673-1955-3}, DOI = {10.1109/IPIN.2012.6418873}, reviewed = {1}, author = {Viol, Nicolai and Bitsch Link, J{\'o} Agila and Wirtz, Hanno and Rothe, Dirk and Wehrle, Klaus} } @Inproceedings { 2012-stoffers-mascots-ns3-propagation-models, title = {Comparing the ns–3 Propagation Models}, year = {2012}, month = {8}, pages = {61--67}, tags = {nonRWTH}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-ns3-propagation-models.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6298165}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'12), Washington D.C., USA}, event_place = {Washington D.C., USA}, event_name = {20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)}, language = {en}, ISBN = {978-1-4673-2453-3}, DOI = {10.1109/MASCOTS.2012.17}, reviewed = {1}, author = {Stoffers, Mirko and Riley, George} } @Inproceedings { 2012-stoffers-pads-hybrid-simulation, title = {Hybrid Simulation of Packet-Level Networks and Functional-Level Routers}, year = {2012}, month = {7}, pages = {111--119}, tags = {nonRWTH}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-hybrid-simulation.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6305897}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China}, event_place = {Zhangjiajie, China}, language = {en}, ISBN = {978-0-7695-4714-5}, ISSN = {1087-4097}, DOI = {10.1109/PADS.2012.22}, reviewed = {1}, author = {Stoffers, Mirko and Riley, George} } @Inproceedings { 2012-wons-bosling-redmann-weingaertner, title = {Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?}, year = {2012}, month = {1}, day = {9}, pages = {131-134}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-students-6lowpan-wons2012.pdf}, web_url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6138950\#}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {Proceedings of the 9th International Conference on Wireless On-demand Network Systems and Services (WONS '12), Courmayeur, Italy}, event_place = {Courmayeur, Italy}, language = {en}, ISBN = {978-1-4577-1722-2}, DOI = {10.1109/WONS.2012.6152218}, reviewed = {1}, author = {Bosling, Marcel and Redmann, Torsten and Tekam, Jean and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { Varj1112:Secure, title = {Secure Resolution of {End-Host} Identifiers for Mobile Clients}, year = {2011}, month = {12}, day = {5}, abstract = {Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT}, keywords = {DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution}, url = {fileadmin/papers/2011/2011-varjonen-secure.pdf}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award}, state = {accepted}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Varjonen, Samu and Heer, Tobias and Rimey, Kenneth and Gurtov, Andrei} } @Article { 2011-kai-JITSR, title = {Project Report: Standardising the Internet of Things – What the Experts Think}, journal = {Int. J. on IT Standards \& Standardisation Research}, year = {2011}, month = {1}, volume = {9}, number = {1}, url = {fileadmin/papers/2011/2011-kai-JITSR.pdf}, misc2 = {print}, publisher = {IGI Global}, address = {Hershey, PA, US}, ISSN = {1539-3062}, reviewed = {1}, author = {Jakobs, Kai and Wagner, Thomas and Reimers, Kai} } @Techreport { rfc5201-bis-03, title = {{Host Identity Protocol Version 2}}, year = {2010}, month = {10}, volume = {1}, number = {draft-ietf-hip-rfc5201-bis-03.txt}, note = {{expires: April 26, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Moskowitz, Robert and Jokela, Petri and R. Henderson, Thomas and Heer, Tobias} } @Inproceedings { 2010softcomweingaertnerprotocolanalysis, title = {Flexible Analysis of Distributed Protocol Implementations using Virtual Time}, year = {2010}, month = {9}, day = {23}, pages = {225 - 229}, note = {available in IEEE Xplore}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-weingaertner-softcom-analysis.pdf}, misc2 = {Online}, publisher = {FESB}, address = {Split, Croatia}, booktitle = {Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010)}, event_place = {Hvar, Croatia}, language = {en}, ISBN = {978-1-4244-8663-2}, reviewed = {1}, author = {Weingaertner, Elias and Ritter, Marko and Sasnauskas, Raimondas and Wehrle, Klaus} } @Techreport { rfc5201-bis-01, title = {{Host Identity Protocol Version 2}}, year = {2010}, month = {9}, volume = {1}, number = {draft-ietf-hip-rfc5201-bis-01.txt}, note = {{expires: March 7, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Moskowitz, Robert and Jokela, Petri and R. Henderson, Thomas and Heer, Tobias} } @Techreport { moskowitz-rfc5201-bis-02, title = {{Host Identity Protocol Version 2}}, year = {2010}, month = {7}, volume = {1}, number = {draft-moskowitz-hip-rfc5201-bis-02.txt}, note = {{expires: January 2, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Moskowitz, Robert and Jokela, Petri and R. Henderson, Thomas and Heer, Tobias} } @Techreport { rfc5201-bis-02, title = {{Host Identity Protocol Version 2}}, year = {2010}, month = {7}, volume = {1}, number = {draft-ietf-hip-rfc5201-bis-02.txt}, note = {{expires: March 7, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Moskowitz, Robert and Jokela, Petri and R. Henderson, Thomas and Heer, Tobias} } @Techreport { moskowitz-rfc5201-bis-01, title = {{Host Identity Protocol Version 2}}, year = {2010}, month = {3}, volume = {1}, number = {draft-moskowitz-hip-rfc5201-bis-01.txt}, note = {{expires: September 10, 2010 (work in progress)}}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Moskowitz Pekka Nikander, Robert and Jokela, Petri and R. Henderson, Thomas and Heer, Tobias} } @Inproceedings { 2010-kai-mccsis.pdf, title = {Standardising the IoT – Collaboration or Competition?}, year = {2010}, pages = {62-66}, url = {https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=\%2Fvar\%2Fwww\%2Ffileadmin\%2Fpapers\%2F2010\%2F\#}, misc2 = {CD}, editor = {Sandeep Krishnamurthy, Gurmit Singh, Maggie McPherson}, publisher = {IADIS, International Association for Development of the Information Society}, booktitle = {Proc. e-Democracy, Equity and Social Justice - EDEM2010, Freiburg, Germany}, language = {en}, ISBN = {978-972-8939-24-3}, reviewed = {1}, author = {Jakobs, Kai and Wagner, Thomas and Reimers, Kai} } @Inproceedings { 2010-kai-erima, title = {Developing Standards for the IoT - A Collaborative Exercise!?}, year = {2010}, volume = {3}, pages = {108-116}, url = {https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=\%2Fvar\%2Fwww\%2Ffileadmin\%2Fpapers\%2F2010\%2F\#}, misc2 = {Online, CD}, editor = {L. Legardeur; K. North}, publisher = {ERIMA}, address = {Bidart, FR}, booktitle = {Towards new challenges for innovative management practices}, language = {en}, ISSN = {2100-0778}, reviewed = {1}, author = {Jakobs, Kai and Wagner, Thomas and Reimers, Kai} } @Conference { 200810riechelcncerco, title = {Range Queries and Load Balancing in a Hierarchically Structured P2P System}, year = {2008}, month = {10}, day = {14}, pages = {28-35}, abstract = {Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, are used more and more for file-sharing and content distribution applications. However, a major weakness of traditional DHTs is the search for stored content, as data is assigned to nodes based on hash functions, and the very nature of hash tables allows only exact pattern matches. We present Cerco, a solution for the problem of range queries by using the principles of order-preserving DHTs and a hierarchically structured P2P approach. To guarantee an efficient routing and load balancing, Cerco uses a dynamic hierarchy of DHTs by creating subrings on demand and two explicit load balancing strategies. Our evaluation shows that Cerco is able to achieve the goals of supporting range queries, logarithmic-hop routing, and efficient load balancing.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4664131\&arnumber=4664148\&count=180\&index=16}, web_url = {http://web.informatik.uni-bonn.de/IV/Mitarbeiter/matthew/Mirror_LCN2008_Website/www.ieeelcn.org/}, misc2 = {Print}, publisher = {IEEE Press}, booktitle = {Proceedings of 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)}, organization = {IEEE}, event_place = {Montreal, Canada}, event_name = {33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)}, event_date = {14-17 Oct. 2008}, language = {en}, ISBN = {978-1-4244-2412-2}, DOI = {10.1109/LCN.2008.4664148}, reviewed = {1}, author = {Rieche, Simon and Vinh, Bui The and Wehrle, Klaus} } @Conference { 200803riechemmvecluster, title = {Clustering Players for Load Balancing in Virtual Worlds}, year = {2008}, month = {3}, day = {18}, pages = {9-13}, abstract = {Massively Multiplayer Online Games (MMOGs) have become increasingly popular in the last years. So far the distribution of load, caused by the players in these games, is not distributed dynamically. After the launch of a new game, the introduction of new content, during special ingame events, or also during normal operations, players tend to concentrate in certain regions of the game worlds and cause overload conditions. Therefore we propose the use of structured P2P technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas; however this approach often split a group of players to different servers, causing additional overhead. This work presents a cluster-based Peer-to-Peer approach, which can be used for load balancing in MMOGs or in other virtual worlds. The system is able to dynamically adapt to the current state of the game and handle uneven distributions of the players in the game world. We show through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based systems, which split the world in rectangular areas.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, url = {http://www.pap.vs.uni-due.de/MMVE08/papers/proceedings.pdf}, web_url = {http://www.pap.vs.uni-due.de/MMVE08/}, misc2 = {Online}, editor = {Gregor Schiele, Daniel Weiskopf, Ben Leong, Shun-Yun Hu}, booktitle = {Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008)}, event_place = {Reno, Nevada, USA}, event_name = {1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008)}, event_date = {March 8th, 2008}, language = {en}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Fouquet, Marc and Niedermayer, Heiko and Teifel, Timo and Carle, Georg} } @Article { 200812riecheIJAMCcluster, title = {Clustering Players for Load Balancing in Virtual Worlds}, journal = {International Journal of Advanced Media and Communication (IJAMC)}, year = {2008}, volume = {2}, number = {4}, pages = {351-363}, abstract = {In current Massively Multiplayer Online Games (MMOGs) the distribution of load is not distributed dynamically. But players tend to concentrate in certain regions of the game world and cause overload conditions. Therefore we propose the use of structured Peer-to-Peer technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas but often split a group of players to different servers. This work presents a cluster-based P2P approach, which is able to dynamically adapt to the current state of the game and handle uneven distributions of players.Weshow through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based system.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, web_url = {http://www.inderscience.com/browse/index.php?journalID=67}, misc2 = {print}, language = {en}, ISSN = {1462-4613}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Fouquet, Marc and Niedermayer, Heiko and Teifel, Timo and Carle, Georg} } @Conference { 200701riecheccncmmog, title = {Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games}, year = {2007}, month = {1}, day = {11}, pages = {763-767}, abstract = {Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive betatesting suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4199088\&arnumber=4199243\&count=254\&index=154}, web_url = {http://www.ieee-ccnc.org/2007/}, misc2 = {Print}, publisher = {IEEE Press}, booktitle = {Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007)}, organization = {IEEE}, event_place = {Las Vegas, Nevada, USA}, event_name = {4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007)}, event_date = {11-13 January 2007}, language = {en}, ISBN = {1-4244-0667-6}, DOI = {10.1109/CCNC.2007.155}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Fouquet, Marc and Niedermayer, Heiko and Petrak, Leo and Carle, Georg} } @Conference { rieche2006cerco, title = {Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System}, year = {2006}, month = {11}, day = {14}, pages = {509-510}, abstract = {Structured Peer-to-Peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called Distributed Hash Tables (DHTs) is partitioned and each partition with its keys and values is assigned to a node in the DHT. For data retrieval however, the very nature of hash tables allows only exact pattern matches. We propose Cerco, a simple solution for the problem of range queries by employing a hierarchically structured P2P approach based on the principles of Distributed Hash Tables. We show that a dynamic hierarchy of DHTs with on-demand classification of items can positively influence the response time of queries while maintaining lookup correctness.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4116490\&arnumber=4116594\&count=192\&index=90}, web_url = {http://web.archive.org/web/20061008091738/http://www.ieeelcn.org/}, misc2 = {Print}, publisher = {IEEE Press}, booktitle = {Proceedings of 31st IEEE Conference on Local Computer Networks (LCN 2006)}, organization = {IEEE}, event_place = {Tampa, Florida, USA}, event_name = {31st IEEE Conference on Local Computer Networks (LCN 2006)}, event_date = {14-16 November 2006}, language = {en}, ISBN = {1-4244-0418-5}, DOI = {10.1109/LCN.2006.322147}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Petrak, Leo and Wrzodek, Clemens} } @Techreport { 200608riechetrmmog, title = {Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games}, year = {2006}, month = {8}, number = {WSI-2006-04}, abstract = {Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive beta-testing suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, url = {http://www.rieche.net/pdf/wsi-2006-04.pdf}, misc2 = {Online}, address = {T{\"u}bingen, Germany}, institution = {Wilhelm-Schickard-Institute for Computer Science, University of T{\"u}bingen}, type = {Technical Report}, language = {en}, author = {Rieche, Simon and Fouquet, Marc and Niedermayer, Heiko and Petrak, Leo and Wehrle, Klaus and Carle, Georg} } @Inproceedings { 2006-heer-percomws-adapt-dht, title = {Adapting Distributed Hash Tables for Mobile Ad Hoc Networks}, year = {2006}, month = {3}, day = {16}, volume = {1}, pages = {1-6}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2005/2006-heer-percomws-dht-adhoc.pdf}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, booktitle = {In Proceedings of 3. IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P'06), Pisa, Italy.}, event_place = {Pisa, Italy}, event_name = {IEEE International Workshop on Mobile Peer-to-Peer Computing}, event_date = {March 2006}, language = {en}, ISBN = {0-7695-2520-2}, DOI = {10.1109/PERCOMW.2006.16}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Rieche, Simon and Wehrle, Klaus} } @Poster { rieche2006poster, title = {Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games}, year = {2006}, month = {3}, abstract = {Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive beta-testing suffer from downtimes because of hard- and software problems and lags on overloaded servers. Our approach is to use structured P2P technology for the server infrastructure of massively multiplayer online games to improve reliability and scalability of these applications. Structured P2P networks are able to adapt to the current state of the game world and handle uneven distributions of the players. For load balancing, we propose algorithms based on the virtual server concept.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, web_url = {http://www.dagstuhl.de/de/programm/kalender/semhp/?semnr=06131}, misc2 = {Print}, editor = {Dagstuhl Seminar 06131 ''Peer-to-Peer Systems and Applications''}, publisher = {Dagstuhl}, organization = {Dagstuhl Seminar 06131}, language = {en}, author = {Rieche, Simon and Wehrle, Klaus} } @Inproceedings { landsiedel2005anonymous, title = {Anonymous IP-Services via Overlay Routing}, year = {2005}, month = {3}, abstract = {Although research provides anonymous Internet communication schemes, anonymous IP-services received only limited attention. In this paper we present SARA (Anonymous Overlay Routing Providing Sender And Receiver Anonymity), which enables sender, receiver and relationship anonymity using layered encryption and distributed traffic mixes, similar to a Chaumian Mix. Via IP-datagram service and address virtualization it is fully transparent to applications. Organized as structured Peer-To-Peer system, SARA is highly scalable and fault tolerant. In SARA each communication partner randomly selects a number of nodes from the overlay and concatenates them to an anonymous communication path. The sender selects the head of the path, the receiver builds the tail and publishes this information in the overlay network using an anonymous ID. Via this ID the sender retrieves the tail nodes of the path and concatenates both path section. Layered encryption hides the identities of the sender, receiver and the intermediate nodes.}, booktitle = {5. W{\"u}rzburger ''Workshop IP Netzmanagement, IP Netzplanung und Optimierung''}, event_place = {W{\"u}rzburg, Germany}, event_name = {5. W{\"u}rzburger ''Workshop IP Netzmanagement, IP Netzplanung und Optimierung''}, event_date = {March 2005}, author = {Landsiedel, Olaf and Rieche, Simon and Niedermayer, Heiko and Wehrle, Klaus and Carle, Georg} } @Inproceedings { petrak2005dienstguete, title = {Dienstg{\"u}te in strukturierten hierarchischen Overlay Netzwerken}, year = {2005}, month = {3}, booktitle = {Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005}, event_place = {Kaiserslautern, Germany}, event_name = {Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005}, event_date = {March 2005}, author = {Petrak, Leo and Rieche, Simon and Wehrle, Klaus} } @Inproceedings { niedermayer2005distribution, title = {On the Distribution of Nodes in Distributed Hash Tables}, year = {2005}, month = {3}, booktitle = {Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005}, event_place = {Kaiserslautern, Germany}, event_name = {Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005}, event_date = {March 2005}, author = {Niedermayer, Heiko and Rieche, Simon and Wehrle, Klaus and Carle, Georg} } @Inproceedings { 200507riecheipgames, title = {On the Use of Structured Peer-to-Peer Systems for Online Gaming}, year = {2005}, month = {3}, abstract = {Massively multiplayer games are becoming increasingly popular today. However, even high-budget titles suffer from downtimes because of hard- and software problems. Our approach is to use structured Peer-to-Peer technology for the server infrastructure of massively multiplayer online games, which improves reliability and scalability of these applications.}, booktitle = {5. W{\"u}rzburger ''Workshop IP Netzmanagement, IP Netzplanung und Optimierung''}, event_place = {W{\"u}rzburg, Germany}, event_name = {5. W{\"u}rzburger ''Workshop IP Netzmanagement, IP Netzplanung und Optimierung''}, event_date = {March 2005}, author = {Rieche, Simon and Fouquet, Marc and Niedermayer, Heiko and Wehrle, Klaus and Carle, Georg} } @Inbook { 200509riechep2pbookreliability, title = {Reliability and Load Balancing in Distributed Hash Tables}, year = {2005}, pages = {119-135}, editor = {Ralf Steinmetz, Klaus Wehrle}, publisher = {Springer}, address = {Heidelberg, Germany}, series = {Lecture Notes in Computer Science, LNCS}, chapter = {9}, booktitle = {Peer-to-Peer Systems and Applications}, author = {Rieche, Simon and Niedermayer, Heiko and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inbook { 200509goetzp2pbookdhtalgorithms, title = {Selected Distributed Hash Table Algorithms}, year = {2005}, pages = {95-117}, editor = {Ralf Steinmetz, Klaus Wehrle}, publisher = {Springer}, address = {Heidelberg, Germany}, series = {Lecture Notes in Computer Science, LNCS}, chapter = {8}, booktitle = {Peer-to-Peer Systems and Applications}, author = {G{\"o}tz, Stefan and Rieche, Simon and Wehrle, Klaus} } @Inbook { 200509wehrlep2pbookdhts, title = {Distributed Hash Tables}, year = {2005}, pages = {79-93}, editor = {Ralf Steinmetz, Klaus Wehrle}, publisher = {Springer}, address = {Heidelberg, Germany}, series = {Lecture Notes in Computer Science, LNCS}, chapter = {7}, booktitle = {Peer-to-Peer Systems and Applications}, author = {Wehrle, Klaus and G{\"o}tz, Stefan and Rieche, Simon} } @Inproceedings { 200503landsiedelfgsnaeon, title = {Project AEON}, year = {2005}, number = {481}, pages = {72-76}, abstract = {Power consumption is a crucial characteristic of sensor networks and their applications, as sensor nodes are commonly battery driven. Although recent research focuses strongly on energy aware applications and operating systems, power consumption is still a limiting factor. Once sensor nodes are deployed, it is challenging and sometimes even impossible to change batteries. As a result, erroneous lifetime prediction causes high costs and may render a sensor network useless, before its purpose is fulfilled. In this paper we present AEON, a novel evaluation tool to quantitatively predict power consumption of sensor nodes and whole sensor networks. Our energy model, based on measurements of node current draw and the execution of real code, enables accurate prediction of the actual power consumption of sensor nodes. Consequently, preventing erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency.}, address = {Z{\"u}rich, CH}, booktitle = {Proceedings of the 4th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Techical Report No. 481}, author = {Landsiedel, Olaf and Wehrle, Klaus and Rieche, Simon and G{\"o}tz, Stefan and Petrak, Leo} } @Conference { rieche2004thermaldissipation, title = {A Thermal-Dissipation-based Approach for Balancing Data Load in Distributed Hash Tables}, year = {2004}, month = {11}, pages = {15-23}, abstract = {A major objective of peer-to-peer (P2P) systems is the management of large amounts of data distributed across many systems. Distributed hash tables (DHT) are designed for highly scalable, self-organizing, and efficient distribution and lookup of data, whereby data is stored globally persistent. The range of values of the corresponding hash function is partitioned and each interval is assigned to a node of the DHT. Because the assignment of data to nodes is based on hash functions, one assumes that the respective data load is distributed evenly across all participating nodes. However most DHT show difficulties with load balancing as we demonstrate in this paper. As a solution for this problem, we present a new and very simple approach for balancing stored data between peers in a fashion analogous to the dissipation of heat energy in materials. We compare this algorithm with other approaches for load balancing and present results based on simulations and a prototype implementation. This new algorithm improves the distribution of load in DHT without requiring major changes of the DHT themselves. In addition, we show that the fault tolerance of peer-to-peer systems is increased by the proposed algorithm.}, url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=29935\&arnumber=1367197\&count=128\&index=2}, misc2 = {Print}, publisher = {IEEE Press}, booktitle = {Proceedings of LCN 2004 – 29th IEEE Conference on Local Computer Networks}, organization = {IEEE}, event_place = {Tampa, Florida, USA}, event_name = {LCN 2004 – 29th IEEE Conference on Local Computer Networks}, event_date = {November 2004}, language = {en}, ISBN = {0-7695-2260-2}, DOI = {10.1109/LCN.2004.10}, author = {Rieche, Simon and Petrak, Leo and Wehrle, Klaus} } @Inproceedings { 200410riechehotp2preliability, title = {Reliability of Data in Structured Peer-to-Peer Systems}, year = {2004}, month = {10}, pages = {108-113}, abstract = {Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. For this purpose Distributed Hash Tables (DHT) offer a highly scalable and self-organizing paradigm for efficient distribution and retrieval of data. Thereby a common assumption of P2P-Systems is, that the participating nodes are unreliable and may fail at any time. Since many of research goes into the design of DHT lookup services, these systems aim to provide a stable global addressing structure. But to storage data reliable in a DHT only few techniques were already developed. However since data has to be stored persistent in the network, it should be retrieved anytime, even if nodes fail. In this work we discuss possibilities to store data fault tolerant in a structured Peer-to-Peer system.}, misc2 = {Print}, booktitle = {Proceedings of HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)}, event_place = {Volendam, Netherlands}, event_name = {HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer}, event_date = {Oct. 2004}, language = {en}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Landsiedel, Olaf and G{\"o}tz, Stefan and Petrak, Leo} } @Inproceedings { rieche2004comparison, title = {Comparison of Load Balancing Algorithms for Structured Peer-to-Peer Systems}, year = {2004}, month = {9}, volume = {51}, misc2 = {Print}, publisher = {GI. LNI}, address = {Bonn, Germany}, series = {LNI}, booktitle = {Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), GI-Jahrestagung Informatik 2004}, event_place = {Ulm, Germany}, event_name = {GI-Jahrestagung Informatik 2004}, language = {en}, reviewed = {1}, author = {Rieche, Simon and Petrak, Leo and Wehrle, Klaus} } @Inproceedings { 2006-heer-gi2004, title = {On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios}, year = {2004}, month = {9}, volume = {51}, pages = {239-244}, abstract = {Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics – namely scalability, flexibility, and resilience – they are quite interesting for being applied in ad-hoc networks. But, there are plenty of open questions concerning the applicability of Distributed Hash Tables in mobile ad-hoc scenarios: Do new problems arise when both technologies are used together? Are there any synergy effects when both technologies are combined? Are the results and assumptions, made for the infrastructural Internet, still true if a mobile ad-hoc network is used instead? In this paper, we discuss these and further questions and offer some solutions for using Distributed Hash Tables in ad-hoc networks.}, misc2 = {Print}, publisher = {GI. LNI}, address = {Bonn, Germany}, series = {LNI}, booktitle = {Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), GI-Jahrestagung Informatik 2004, Bonn, Germany}, event_place = {Ulm, Germany}, event_name = {GI-Jahrestagung Informatik 2004}, language = {en}, ISBN = {3-88579-380-6}, reviewed = {1}, author = {Heer, Tobias and Niedermayer, Heiko and Petrak, Leo and Rieche, Simon and Wehrle, Klaus} } @Inproceedings { 200410wehrlefgpcintegriertekonstruktionsmethode, title = {Integrierte Konstruktionsmethoden f{\"u}r flexible Protokolle in ubiquit{\"a}ren Kommunikationssystemen}, year = {2004}, address = {Stuttgart, Germany}, booktitle = {Proceedings of the GI/ITG KuVS Fachgespr{\"a}ch Systemsoftware f{\"u}r Pervasive Computing}, author = {Wehrle, Klaus and Landsiedel, Olaf and Rieche, Simon and G{\"o}tz, Stefan and Petrak, Leo} } @Inproceedings { 1997-thissen-kivs-trader, title = {Einbeziehung von Nutzerinteressen bei der QoS-basierten Dienstvermittlung unter CORBA}, year = {1997}, pages = {236-251}, misc2 = {Print}, publisher = {Springer}, booktitle = {Proceedings der 10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97), Braunschweig, Germany}, event_place = {Braunschweig}, event_name = {10. GI-Fachtagung Kommunikation in Verteilten Systemen (KiVS'97)}, language = {de}, ISBN = {3-540-62565-8}, reviewed = {1}, author = {Reichl, Peter and Linnhoff-Popien, Claudia and Thi{\ss}en, Dirk} } @Inproceedings { 1996-thissen-dccn-trader, title = {How to Enhance Service Selection in Distributed Systems}, year = {1996}, pages = {114-123}, misc2 = {Print}, booktitle = {Proceedings of the 1st International Conference on Distributed Computer Communication Networks (DCCN'96), Tel Aviv, Isreal}, event_place = {Tel Aviv, Isreal}, event_name = {1st International Conference on Distributed Computer Communication Networks (DCCN'96)}, language = {en}, author = {Reichl, Peter and Thi{\ss}en, Dirk and Linnhoff-Popien, Claudia} }