% % This file was created by the TYPO3 extension % bib % --- Timezone: CET % Creation date: 2024-03-29 % Creation time: 02-06-50 % --- Number of references % 13 % @Inproceedings { 2010-krebs-Globecom10-clustering-mesh-conference, title = {Topology Stability-Based Clustering for Wireless Mesh Networks}, year = {2010}, month = {12}, volume = {1}, pages = {1-5}, abstract = {In the past, many clustering algorithms for ad-hoc networks have been proposed. Their main objective is to solve the scalability issue of ad-hoc networks by grouping nodes into clusters. The challenge in MANETs for those clustering algorithms is to cope with the high node mobility which affects the stability of the cluster structures. Wireless mesh networks consist of a static backbone and a number of mobile nodes. In the backbone of a wireless mesh network the topology is relatively static. However, topology changes occur due to frequent link losses and temporary link instability. Due to the static nature of the backbone, mobility-based approaches are not suitable in this case. In this paper, we state the important aspects for stable clustering in wireless mesh networks with unidirectional links based on the investigation of a 45-node wireless mesh testbed. We analyze well-known clustering algorithms and their performance in a large-scale testbed. Finally, we propose a new clustering algorithm called Stable Link Clustering Algorithm (SLCA).}, url = {fileadmin/papers/2010/2010-lora-clustering-MESH.pdf}, web_url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5683417}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, USA}, event_place = {Miami, FL, USA}, event_name = {IEEE Global Telecommunications Conference, GLOBECOM 2010}, event_date = {6 - 10 December 2010}, language = {en}, ISBN = {978-1-4244-5636-9}, DOI = {10.1109/GLOCOM.2010.5683417}, reviewed = {1}, author = {Krebs, Martin and Stein, Andr{\'e} and Lora Gir{\'o}n, M{\'o}nica Alejandra} } @Inproceedings { 2010-sensys-sasnauskas-coojakleenet, title = {Demo Abstract: Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding}, year = {2010}, month = {11}, pages = {383--384}, abstract = {High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools. We integrate the KleeNet symbolic execution engine with the COOJA network simulator to allow for straight-forward and intuitive high-coverage testing initiated from a simulation environment. A tight coupling of simulation and testing helps detect, narrow down, and fix complex interaction bugs in an early development phase. We demonstrate the seamless transition between COOJA simulation and KleeNet symbolic execution. Our framework enables future research in how high-coverage testing tools could be used in cooperation with simulation tools.}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-osterlind_sasnauskas-sensys-coojakleenet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4503-0344-6}, DOI = {http://doi.acm.org/10.1145/1869983.1870034}, reviewed = {1}, author = {{\"O}sterlind, Fredrik and Sasnauskas, Raimondas and Dunkels, Adam and Soria Dustmann, Oscar and Wehrle, Klaus} } @Inproceedings { schleinzer10, title = {A Security Pattern for Data Integrity in P2P Systems}, year = {2010}, month = {10}, day = {16}, misc2 = {Online}, publisher = {ACM}, booktitle = {PLoP 2010, Reno, NV, USA}, event_place = {Reno}, event_name = {PLoP 2010}, state = {unpublished}, language = {en}, reviewed = {1}, author = {Schleinzer, Benjamin and Yoshioka, Nobukazu} } @Conference { 2010-08-lcn-samad-ASSA, title = {Adaptive Security Established on the Requirements and Resource Abilities of Network Nodes}, year = {2010}, month = {10}, day = {11}, volume = {1}, pages = {752-755}, misc2 = {Online}, publisher = {IEEE}, booktitle = {The 10th IEEE Wireless Local Networks(WLN 2010) in the 35th IEEE Local Computer Networks (LCN 2010), Denver, Colorado, U.S.A.}, event_place = {Denver, Colorado, United States}, event_name = {IEEE Local Computer Networks (IEEE LCN 2010)}, event_date = {11-14 Oct. 2010}, language = {en}, ISBN = {978-1-4244-8388-4}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Inproceedings { 2010softcomweingaertnerprotocolanalysis, title = {Flexible Analysis of Distributed Protocol Implementations using Virtual Time}, year = {2010}, month = {9}, day = {23}, pages = {225 - 229}, note = {available in IEEE Xplore}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-weingaertner-softcom-analysis.pdf}, misc2 = {Online}, publisher = {FESB}, address = {Split, Croatia}, booktitle = {Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010)}, event_place = {Hvar, Croatia}, language = {en}, ISBN = {978-1-4244-8663-2}, reviewed = {1}, author = {Weingaertner, Elias and Ritter, Marko and Sasnauskas, Raimondas and Wehrle, Klaus} } @Conference { 2010-08-icccn-samad-PiCAT, title = {PiCAT: Palliating Channel Assignment Assaults using Adjustable Trust in Wireless Mesh Networks}, journal = {IEEE ICCCN 2010}, year = {2010}, month = {8}, day = {2}, volume = {1}, pages = {1 - 7}, misc2 = {Online}, publisher = {IEEE}, howpublished = {Medienkombination}, booktitle = {The 19th International Conference on Computer Communications and Networks (ICCCN 2010), Zurich, Switzerland}, event_place = {Zurich, Switzerland}, event_name = {19th International Conference on Computer Communications and Networks (ICCCN 2010)}, event_date = {August 2–5, 2010}, language = {en}, ISBN = {978-1-4244-7114-0}, ISSN = {1095-2055}, DOI = {10.1109/ICCCN.2010.5560076}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Inbook { 2010-simtools-sasnauskas-transport, title = {Modeling Transport Layer Protocols}, year = {2010}, month = {6}, pages = {389-399}, misc2 = {Print}, editor = {Klaus Wehrle, Mesut Guenes, James Gross}, publisher = {Springer}, address = {Germany}, chapter = {17}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Sasnauskas, Raimondas and Weingaertner, Elias} } @Inproceedings { icc2010vpsim, title = {Towards Network Centric Development of Embedded Systems}, year = {2010}, month = {5}, day = {23}, pages = {1-6}, abstract = {Nowadays, the development of embedded system hardware and related system software is mostly carried out using virtual platform environments. The high level of modeling detail (hardware elements are partially modeled in a cycle-accurate fashion) is required for many core design tasks. At the same time, the high computational complexity of virtual platforms caused by the detailed level of simulation hinders their application for modeling large networks of embedded systems. In this paper, we propose the integration of virtual platforms with network simulations, combining the accuracy of virtual platforms with the versatility and scalability of network simulation tools. Forming such a hybrid toolchain facilitates the detailed analysis of embedded network systems and related important design aspects, such as resource effectiveness, prior to their actual deployment.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-schuermans-weingaertner-network_centric.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23-27}, language = {en}, ISBN = {978-1-4244-6402-9}, ISSN = {1550-3607}, DOI = {10.1109/ICC.2010.5502185}, reviewed = {1}, author = {Sch{\"u}rmanns, Stefan and Weingaertner, Elias and Kempf, Torsten and Ascheid, Gerd and Wehrle, Klaus and Leupers, Rainer} } @Inproceedings { 2010-ipsn-sasnauskas-kleenet, title = {KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment}, year = {2010}, month = {4}, day = {12}, pages = {186--196}, abstract = {Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.}, keywords = {automated protocol testing, experimentation, failure detection, wireless sensor networks}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791235}, reviewed = {1}, author = {Sasnauskas, Raimondas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 20104-IPSN-alizai-svr, title = {Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks}, year = {2010}, month = {4}, day = {12}, pages = {366-367}, abstract = {We present Statistical Vector Routing (SVR), a protocol that efficiently deals with communication link dynamics in wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.}, tags = {wld}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1791257}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, event_place = {Stockholm, Sweden}, event_name = {9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)}, event_date = {April 12-16, 2010}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and Sasnauskas, Raimondas and Wehrle, Klaus} } @Inproceedings { inproceedingsreference201001221179332027, title = {Towards a Flexible and Versatile Cross-Layer-Coordination Architecture}, year = {2010}, month = {3}, day = {15}, pages = {1-5}, abstract = {In wireless and mobile networking, volatile environ- mental conditions are a permanent challenge, resulting in a demand for cross-layer optimizations. To further increase flexibility, we believe cross-layer architectures should adapt themselves to these changing conditions, just as they adapt the network stack, devices, and applications. In this paper, we propose CRAWLER, a novel cross-layer architecture that combines three core properties: signaling between all layers and system components; extensibility and adaptability at runtime; and high usability for cross-layer developers. CRAWLER increases flexibility, as well as expediting and simplifying cross- layer development.}, note = {Work in Progress session}, tags = {crawler}, url = {fileadmin/papers/2010/2010-03-infocom-aktas-crawler.pdf}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA}, language = {en}, ISBN = {978-1-4244-6739-6}, reviewed = {1}, author = {Aktas, Ismet and Otten, Jens and Schmidt, Florian and Wehrle, Klaus} } @Inproceedings { inproceedingsreference201001227195395138, title = {Iterative Source-Channel Decoding with Cross-Layer Support for Wireless VoIP}, year = {2010}, month = {1}, day = {18}, volume = {1}, pages = {1-6}, abstract = {This paper presents a cross-layer approach for iterative source-channel decoding (ISCD) in wireless VoIP networks. The novelty of the proposed method is the incorporation of both, speech bits as well as protocol header bits, into the ISCD process. The header bits take the role of pilot bits having perfect reliability. These bits are distributed over the frame as strong supporting points for the MAP decoder which results in a significant enhancement of the output speech quality compared to the benchmark scheme using ISCD for speech only. For this approach, we exploit new cross-layer concepts that support the direct communication between non-adjacent layers. These concepts enable the iterative exchange of extrinsic information between the source decoder located on the application layer and the channel decoder located on the physical layer. This technique can also be applied to audio and video transmission.}, tags = {refector}, url = {fileadmin/papers/2010/2010-01-scc-breddermann-iscd.pdf}, misc2 = {CD-ROM / DVD-ROM}, editor = {Rudolf Mathar, Christoph Ruland}, publisher = {VDE Verlag}, address = {Berlin, Germany}, series = {Proceedings of International ITG Conference on Source and Channel Coding}, booktitle = {Proceedings of International ITG Conference on Source and Channel Coding}, organization = {ITG}, event_place = {Siegen}, event_name = {International ITG Conference on Source and Channel Coding 2010}, event_date = {January 18-21, 2010}, language = {en}, ISBN = {978-3-8007-3211-1}, reviewed = {1}, author = {Breddermann, Tobias and Lueders, Helge and Vary, Peter and Aktas, Ismet and Schmidt, Florian} } @Inproceedings { Eisenblaetter10, title = {{A Two-Stage Approach to WLAN Planning: Detailed Performance Evaluation Along the Pareto Frontier}}, year = {2010}, pages = {227 -236}, booktitle = {Proc. of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'10)}, author = {Eisenbl{\"a}tter, Andreas and Geerdes, Hans-Florian and Gross, James and Pu{\~n}al, Oscar and Schweiger, Jonas} }