% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-25 % Creation time: 20-12-21 % --- Number of references % 14 % @Inproceedings { 2011-12-conext-schmidt-refector, title = {Refector: Heuristic Header Error Recovery for Error-Tolerant Transmissions}, year = {2011}, month = {12}, day = {6}, pages = {1--12}, tags = {refector}, url = {fileadmin/papers/2011/2011-schmidt-refector-conext.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 7th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Tokyo, Japan}, event_place = {Tokyo, Japan}, event_name = {7th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT)}, event_date = {6-9 December, 2011}, language = {en}, ISBN = {978-1-4503-1041-3}, DOI = {10.1145/2079296.2079318}, reviewed = {1}, author = {Schmidt, Florian and Alizai, Muhammad Hamad and Aktas, Ismet and Wehrle, Klaus} } @Inproceedings { 2011-globecom-bitsch-geodtn, title = {geoDTN: Geographic Routing in Disruption Tolerant Networks}, year = {2011}, month = {12}, day = {5}, pages = {1 -- 5}, abstract = {In this paper we present a disruption tolerant routing algorithm based on geographic location information, which improves upon the hop count compared to the current state of the art by up to a factor of three in large scale human networks. Leveraging only the history of geographic movement patterns in the two-hop neighborhood, our algorithm is able to perform well in the absence of knowledge of social interaction between nodes and without detailed future schedule information. Representing previously visited locations as probability distributions encoded in an efficient vector, we formalize a heuristic for efficiently forwarding messages in disruption tolerant networks, implement a framework for comparing our approach with the state of the art, and evaluate key metrics, such as hop count and delivery rate, as well as energy consumption and battery depletion fairness on real world data. We are able to outperform the state of the art in human mobility based networks considerably in terms of energy usage per node, thereby extending data network availability further into areas devoid of otherwise necessary communication infrastructure.}, url = {fileadmin/papers/2011/2011-GlobeCom-bitsch-geoDTN.pdf}, misc2 = {Online}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Houston, Texas, USA}, organization = {IEEE}, event_place = {Houston, Texas, USA}, event_name = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN)}, event_date = {5-9 December 2011}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Schmitz, Daniel and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-03, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {10}, day = {31}, number = {draft-garcia-core-security-03}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-extremecom-bitsch-neighbordiscovery, title = {Perfect Difference Sets for Neighbor Discovery}, year = {2011}, month = {9}, day = {26}, pages = {1--6}, abstract = {We present an energy efficient neighbor discovery framework that enables Linux and TinyOS based systems to discover and connect to neighbors via IEEE 802.11 and IEEE 802.15.4, which are only available sporadically. Using quorum schemes, we schedule on and off times of the wireless transmitters, to guarantee mutual discovery with minimum power given a specific latency requirement. Neighbor discovery is fundamental to intermittently connected networks, such as disruption and delay tolerant networks and optimizing it, can lead to significant overall energy savings. Using perfect difference sets, our results indicate that we reduce the latency by up to 10 times at a duty cycle of 2\% compared to the state of the art. We further define and characterize our neighbor discovery scheme with respect to fairness for asymmetric energy scenarios. Using these results, we allow energy-harvesting applications to adjust neighbor discovery based on their current energy requirements as a well defined trade-off.}, keywords = {Neighbor Discovery; Sporadic Connectivity; Wireless Networks}, url = {fileadmin/papers/2011/2011-ExtremeCom-bitsch-NeighborDiscovery.pdf}, web_url = {http://www.cl.cam.ac.uk/\verb=~=fb375/extremecom/2011/program.html}, web_url2 = {http://dl.acm.org/citation.cfm?id=2414398\&CFID=194814085\&CFTOKEN=73001357}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 3rd Extreme Conference of Communication (ExtremeCom 2011), Manaus, Brazil}, event_place = {Manaus, Brazil}, event_name = {ExtremeCom 2011}, event_date = {26-30 September 2011}, language = {en}, ISBN = {978-1-4503-1079-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Wollgarten, Christoph and Schupp, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath-long, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones}, year = {2011}, month = {9}, day = {21}, pages = {1--8}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-long.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6071934\&tag=1}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-1-4577-1803-8}, DOI = {http://dx.doi.org/10.1109/IPIN.2011.6071934}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Viol, Nicolai and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones (short paper)}, year = {2011}, month = {9}, day = {21}, pages = {1--4}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the de- tected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, note = {short paper (long paper is also available)}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath.pdf}, web_url = {http://ipin2011.dsi.uminho.pt/PDFs/Shortpaper/17_Short_Paper.pdf}, web_url2 = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-slides.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-972-8692-63-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-02, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {7}, day = {11}, number = {draft-garcia-core-security-02}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-02}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-icdcs-sasnauskas-sde, title = {Scalable Symbolic Execution of Distributed Systems}, year = {2011}, month = {6}, pages = {333-342}, abstract = {Recent advances in symbolic execution have proposed a number of promising solutions to automatically achieve high-coverage and explore non-determinism during testing. This attractive testing technique of unmodified software assists developers with concrete inputs and deterministic schedules to analyze erroneous program paths. Being able to handle complex systems' software, these tools only consider single software instances and not their distributed execution which forms the core of distributed systems. The step to symbolic distributed execution is however steep, posing two core challenges: (1) additional state growth and (2) the state intra-dependencies resulting from communication. In this paper, we present SDE—a novel approach enabling scalable symbolic execution of distributed systems. The key contribution of our work is two-fold. First, we generalize the problem space of SDE and develop an algorithm significantly eliminating redundant states during testing. The key idea is to benefit from the nodes' local communication minimizing the number of states representing the distributed execution. Second, we demonstrate the practical applicability of SDE in testing with three sensornet scenarios running Contiki OS.}, tags = {kleenet}, url = {fileadmin/papers/2011/2011-06-icdcs-sasnauskas-sde.pdf}, misc2 = {Druck}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011), June 2011, Minneapolis, MN, USA}, language = {en}, ISBN = {978-0-7695-4364-2}, ISSN = {1063-6927}, DOI = {10.1109/ICDCS.2011.28}, reviewed = {1}, author = {Sasnauskas, Raimondas and Soria Dustmann, Oscar and Kaminski, Benjamin Lucien and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-nsdi-slicetime-weingaertner, title = {SliceTime: A platform for scalable and accurate network emulation}, year = {2011}, month = {3}, day = {30}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-nsdi-slicetime-camera_ready_14P.pdf}, misc2 = {Online}, publisher = {USENIX}, address = {Berkeley, CA, USA}, booktitle = {Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA}, event_place = {Boston, Massachusetts}, language = {en}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and vom Lehn, Hendrik and Heer, Tobias and Wehrle, Klaus} } @Article { 22011-itag-samad-cadplus, title = {CAD+: Detecting Colluding Nodes in Gray Hole Attacks}, journal = {Lecture Notes in Informatics GI-Edition}, year = {2011}, month = {3}, day = {25}, volume = {S-10}, number = {Informatiktage 2011}, pages = {279-282}, misc2 = {Druck}, publisher = {K{\"o}llen Verlag GmbH}, address = {Bonn, Germany}, series = {Gesellschaft f{\"u}r Informatik (GI) S-10}, language = {en}, ISBN = {978-3-88579- 444-8}, ISSN = {1614-3213}, author = {Karuppayah, Shankar and Samad, Fahad} } @Inproceedings { 2011-kunz-omnetpp-horizon, title = {Runtime Efficient Event Scheduling in Multi-threaded Network Simulation}, year = {2011}, month = {3}, day = {21}, pages = {359-366}, abstract = {Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation. We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \textbackslashemph\{push-based event handling scheme\} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \textbackslashemph\{event scheduling algorithm\} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {4th International Workshop on OMNeT++ (OMNeT++'11)}, event_date = {March 21, 2011}, language = {en}, ISBN = {978-1-936968-00-8}, DOI = {10.4108/icst.simutools.2011.245504}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-01, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {14}, number = {draft-garcia-core-security-01}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Techreport { 2011-draft-garcia-core-security-00, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {7}, number = {draft-garcia-core-security-00}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Article { 2011-03-Zimmermann, title = {IP address assignment in wireless mesh networks}, journal = {Wireless Communications and Mobile Computing}, year = {2011}, month = {3}, volume = {11}, number = {3}, pages = {321-337}, misc2 = {Online}, publisher = {John Wiley \& Sons Ltd.}, address = {Hoboken, NJ, USA}, language = {en}, DOI = {10.1002/wcm.982}, reviewed = {1}, author = {Zimmermann, Alexander and Hannemann, Arnd and Schleinzer, Benjamin} }