% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-19 % Creation time: 21-06-07 % --- Number of references % 210 % @Inproceedings { 2024-wagner-madtls, title = {Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication}, year = {2024}, month = {7}, day = {1}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-wagner-madtls.pdf}, booktitle = {19th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS '24), Singapur}, event_place = {Singapur}, event_name = {ACM ASIA Conference on Computer and Communications Security (AsiaCCS)}, event_date = {July 1-5, 2024}, state = {unpublished}, reviewed = {1}, author = {Wagner, Eric and Heye, David and Serror, Martin and Kunze, Ike and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2024-kunze-spintrap, title = {SpinTrap: Catching Speeding QUIC Flows}, year = {2024}, month = {5}, day = {7}, publisher = {IEEE/IFIP}, booktitle = {Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS '24)}, event_name = {2024 IEEE/IFIP Network Operations and Management Symposium}, state = {accepted}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Tissen, Lars and Bode, Benedikt and Wehrle, Klaus} } @Inproceedings { 2024-kunze-civic, title = {In-Situ Model Validation for Continuous Processes Using In-Network Computing}, year = {2024}, month = {5}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-kunze-civic.pdf}, booktitle = {Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '24)}, state = {accepted}, reviewed = {1}, author = {Kunze, Ike and Scheurenberg, Dominik and Tirpitz, Liam and Geisler, Sandra and Wehrle, Klaus} } @Article { 2024_lohmoeller_sovereignty-survey, title = {The Unresolved Need for Dependable Guarantees on Security, Sovereignty, and Trust in Data Ecosystems}, journal = {Data \& Knowledge Engineering}, year = {2024}, month = {3}, day = {19}, volume = {151}, abstract = {Data ecosystems emerged as a new paradigm to facilitate the automated and massive exchange of data from heterogeneous information sources between different stakeholders. However, the corresponding benefits come with unforeseen risks as sensitive information is potentially exposed, questioning their reliability. Consequently, data security is of utmost importance and, thus, a central requirement for successfully realizing data ecosystems. Academia has recognized this requirement, and current initiatives foster sovereign participation via a federated infrastructure where participants retain local control over what data they offer to whom. However, recent proposals place significant trust in remote infrastructure by implementing organizational security measures such as certification processes before the admission of a participant. At the same time, the data sensitivity incentivizes participants to bypass the organizational security measures to maximize their benefit. This issue significantly weakens security, sovereignty, and trust guarantees and highlights that organizational security measures are insufficient in this context. In this paper, we argue that data ecosystems must be extended with technical means to (re)establish dependable guarantees. We underpin this need with three representative use cases for data ecosystems, which cover personal, economic, and governmental data, and systematically map the lack of dependable guarantees in related work. To this end, we identify three enablers of dependable guarantees, namely trusted remote policy enforcement, verifiable data tracking, and integration of resource-constrained participants. These enablers are critical for securely implementing data ecosystems in data-sensitive contexts.}, keywords = {Data sharing; Confidentiality; Integrity protection; Data Markets; Distributed databases}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-lohmoeller-data-sovereignty-survey.pdf}, publisher = {Elsevier}, ISSN = {0169-023X}, DOI = {10.1016/j.datak.2024.102301}, reviewed = {1}, author = {Lohm{\"o}ller, Johannes and Pennekamp, Jan and Matzutt, Roman and Schneider, Carolin Victoria and Vlad, Eduard and Trautwein, Christian and Wehrle, Klaus} } @Inproceedings { 2024-wagner-acns-aggregate, title = {When and How to Aggregate Message Authentication Codes on Lossy Channels?}, year = {2024}, month = {3}, day = {5}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-wagner-mac-aggregation.pdf}, booktitle = {22nd International Conference on Applied Cryptography and Network Security (ACNS '24), Abu Dhabi, UAE}, event_place = {Abu Dhabi, UAE}, event_name = {International Conference on Applied Cryptography and Network Security (ACNS)}, event_date = {March 5-9, 2024}, state = {accepted}, reviewed = {1}, author = {Wagner, Eric and Serror, Martin and Wehrle, Klaus and Henze, Martin} } @Article { 2024_pennekamp_supply-chain-survey, title = {An Interdisciplinary Survey on Information Flows in Supply Chains}, journal = {ACM Computing Surveys}, year = {2024}, month = {2}, day = {1}, volume = {56}, number = {2}, abstract = {Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010--2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.}, keywords = {information flows; data communication; supply chain management; data security; data sharing; systematic literature review}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-supply-chain-survey.pdf}, publisher = {ACM}, ISSN = {0360-0300}, DOI = {10.1145/3606693}, reviewed = {1}, author = {Pennekamp, Jan and Matzutt, Roman and Klinkm{\"u}ller, Christopher and Bader, Lennart and Serror, Martin and Wagner, Eric and Malik, Sidra and Spi{\ss}, Maria and Rahn, Jessica and G{\"u}rpinar, Tan and Vlad, Eduard and Leemans, Sander J. J. and Kanhere, Salil S. and Stich, Volker and Wehrle, Klaus} } @Article { 2024_pennekamp_supply-chain-sensing, title = {Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs}, journal = {IEEE Access}, year = {2024}, month = {1}, day = {8}, volume = {12}, pages = {9350-9368}, abstract = {Supply chains increasingly develop toward complex networks, both technically in terms of devices and connectivity, and also anthropogenic with a growing number of actors. The lack of mutual trust in such networks results in challenges that are exacerbated by stringent requirements for shipping conditions or quality, and where actors may attempt to reduce costs or cover up incidents. In this paper, we develop and comprehensively study four scenarios that eventually lead to end-to-end-secured sensing in complex IoT-based supply chains with many mutually distrusting actors, while highlighting relevant pitfalls and challenges—details that are still missing in related work. Our designs ensure that sensed data is securely transmitted and stored, and can be verified by all parties. To prove practical feasibility, we evaluate the most elaborate design with regard to performance, cost, deployment, and also trust implications on the basis of prevalent (mis)use cases. Our work enables a notion of secure end-to-end sensing with minimal trust across the system stack, even for complex and opaque supply chain networks.}, keywords = {blockchain technology; reliability; security; trust management; trusted computing; trusted execution environments}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2024/2024-pennekamp-secure-sensing.pdf}, ISSN = {2169-3536}, DOI = {10.1109/ACCESS.2024.3350778}, reviewed = {1}, author = {Pennekamp, Jan and Alder, Fritz and Bader, Lennart and Scopelliti, Gianluca and Wehrle, Klaus and M{\"u}hlberg, Jan Tobias} } @Article { 2023_pennekamp_purchase_inquiries, title = {Offering Two-Way Privacy for Evolved Purchase Inquiries}, journal = {ACM Transactions on Internet Technology}, year = {2023}, month = {11}, day = {17}, volume = {23}, number = {4}, abstract = {Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today's established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches' scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.}, keywords = {bootstrapping procurement; secure industrial collaboration; private set intersection; homomorphic encryption; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-purchase-inquiries.pdf}, publisher = {ACM}, ISSN = {1533-5399}, DOI = {10.1145/3599968}, reviewed = {1}, author = {Pennekamp, Jan and Dahlmanns, Markus and Fuhrmann, Frederik and Heutmann, Timo and Kreppein, Alexander and Grunert, Dennis and Lange, Christoph and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2023_bader_reputation-systems, title = {Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation}, year = {2023}, month = {11}, abstract = {Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volatile supply chain networks introduce, (2) give an overview of the diverse landscape of privacy-preserving reputation systems and their properties, and (3) based on well-established concepts from supply chain information systems and cryptography, we further propose an initial concept that accounts for the aforementioned challenges by utilizing fully homomorphic encryption. For future work, we identify the need of evaluating whether novel systems address the supply chain-specific privacy and confidentiality needs.}, note = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST)}, keywords = {SCM; confidentiality; anonymity; voter; votee; FHE}, tags = {internet-of-production}, url = {https://jpennekamp.de/wp-content/papercite-data/pdf/bpt+23.pdf}, publisher = {Springer}, booktitle = {Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '23), November 14-17, 2023, Melbourne, VIC, Australia}, event_place = {Melbourne, VIC, Australia}, event_date = {November 14-17, 2023}, state = {accepted}, ISSN = {1867-8211}, reviewed = {1}, author = {Bader, Lennart and Pennekamp, Jan and Thevaraj, Emildeon and Spi{\ss}, Maria and Kanhere, Salil S. and Wehrle, Klaus} } @Inproceedings { 2023-kunze-spin-bit-in-the-wild, title = {Does It Spin? On the Adoption and Use of QUIC’s Spin Bit}, year = {2023}, month = {10}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-kunze-spin-bit-in-the-wild.pdf}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '23)}, event_name = {Internet Measurement Conference 2023}, DOI = {10.1145/3618257.3624844}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Wehrle, Klaus} } @Inproceedings { 2023-sander-quic-ecn, title = {ECN with QUIC: Challenges in the Wild}, year = {2023}, month = {10}, tags = {legato}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-sander-quic-ecn.pdf}, web_url = {https://arxiv.org/abs/2309.14273}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '23)}, event_name = {Internet Measurement Conference 2023}, ISBN = {979-8-4007-0382-9/23/10}, DOI = {10.1145/3618257.3624821}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Bl{\"o}cher, Leo and Kosek, Mike and Wehrle, Klaus} } @Inproceedings { 2023-redefine-mpc-cosimulation, title = {Delay-aware Model Predictive Control for Fast Frequency Control}, journal = {Proceedings of the 14th IEEE International Conference on Smart Grid Communications (SmartGridComm 2023)}, year = {2023}, month = {10}, tags = {redefine}, publisher = {IEEE}, booktitle = {Proceedings of the 14th IEEE International Conference on Smart Grid Communications (SmartGridComm 2023)}, state = {accepted}, reviewed = {1}, author = {Heins, Tobias and Glebke, Ren{\'e} and Stoffers, Mirko and Gurumurthy, Sriram and Heesemann, Jan and Josevski, Martina and Monti, Antonello and Wehrle, Klaus} } @Inproceedings { 2023-wolsing-xluuvlab, title = {XLab-UUV – A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles}, year = {2023}, month = {10}, abstract = {Roughly two-thirds of our planet is covered with water, and so far, the oceans have predominantly been used at their surface for the global transport of our goods and commodities. Today, there is a rising trend toward subsea infrastructures such as pipelines, telecommunication cables, or wind farms which demands potent vehicles for underwater work. To this end, a new generation of vehicles, large and Extra-Large Unmanned Underwater Vehicles (XLUUVs), is currently being engineered that allow for long-range, remotely controlled, and semi-autonomous missions in the deep sea. However, although these vehicles are already heavily developed and demand state-of-the-art communi- cation technologies to realize their autonomy, no dedicated test and development environments exist for research, e.g., to assess the implications on cybersecurity. Therefore, in this paper, we present XLab-UUV, a virtual testbed for XLUUVs that allows researchers to identify novel challenges, possible bottlenecks, or vulnerabilities, as well as to develop effective technologies, protocols, and procedures.}, keywords = {Maritime Simulation Environment, XLUUV, Cyber Range, Autonomous Shipping, Operational Technology}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-wolsing-xluuvlab.pdf}, publisher = {IEEE}, booktitle = {1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS)}, event_place = {Daytona Beach, Florida, USA}, event_name = {1st IEEE LCN Workshop on Maritime Communication and Security (MarCaS)}, event_date = {Oktober 1-5, 2023}, state = {accepted}, language = {en}, DOI = {10.1109/LCN58197.2023.10223405}, reviewed = {1}, author = {Wolsing, Konrad and Saillard, Antoine and Padilla, Elmar and Bauer, Jan} } @Inproceedings { 2023-bader-metrics, title = {METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks}, year = {2023}, month = {9}, day = {28}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bader-metrics.pdf}, booktitle = {Proceedings of the 9th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS '23), co-located with the the 28th European Symposium on Research in Computer Security (ESORICS '23)}, event_place = {The Hague, The Netherlands}, event_name = {9th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS '23)}, event_date = {September 28, 2023}, state = {accepted}, DOI = {10.1007/978-3-031-54204-6_2}, reviewed = {1}, author = {Bader, Lennart and Wagner, Eric and Henze, Martin and Serror, Martin} } @Inproceedings { 2023_bodenbenner_fairsensor, title = {FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization}, year = {2023}, month = {7}, day = {20}, abstract = {The long-term utility and reusability of measurement data from production processes depend on the appropriate contextualization of the measured values. These requirements further mandate that modifications to the context need to be recorded. To be (re-)used at all, the data must be easily findable in the first place, which requires arbitrary filtering and searching routines. Following the FAIR guiding principles, fostering findable, accessible, interoperable and reusable (FAIR) data, in this paper, the FAIR Sensor Ecosystem is proposed, which provides a contextualization middleware based on a unified data metamodel. All information and relations which might change over time are versioned and associated with temporal validity intervals to enable full reconstruction of a system's state at any point in time. A technical validation demonstrates the correctness of the FAIR Sensor Ecosystem, including its contextualization model and filtering techniques. State-of-the-art FAIRness assessment frameworks rate the proposed FAIR Sensor Ecosystem with an average FAIRness of 71\%. The obtained rating can be considered remarkable, as deductions mainly result from the lack of fully appropriate FAIRness metrics and the absence of relevant community standards for the domain of the manufacturing industry.}, keywords = {FAIR Data; Cyber-Physical Systems; Data Management; Data Contextualization; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-bodenbenner-fair-ecosystem.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 21th IEEE International Conference on Industrial Informatics (INDIN '23), July 17-20, 2023, Lemgo, Germany}, event_place = {Lemgo, Germany}, event_date = {July 17-20, 2023}, ISBN = {978-1-6654-9313-0}, ISSN = {2378-363X}, DOI = {10.1109/INDIN51400.2023.10218149}, reviewed = {1}, author = {Bodenbenner, Matthias and Pennekamp, Jan and Montavon, Benjamin and Wehrle, Klaus and Schmitt, Robert H.} } @Inproceedings { 2023-schemmel-kdalloc-tool, title = {KDAlloc: The KLEE Deterministic Allocator: Deterministic Memory Allocation during Symbolic Execution and Test Case Replay}, year = {2023}, month = {7}, day = {13}, url = {https://dl.acm.org/doi/pdf/10.1145/3597926.3604921}, booktitle = {ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023)}, DOI = {10.1145/3597926.3604921}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Busse, Frank and Nowack, Martin and Cadar, Cristian} } @Inproceedings { 2023-dahlmanns-docker, title = {Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact}, year = {2023}, month = {7}, day = {10}, pages = {797-811}, abstract = {Containerization allows bundling applications and their dependencies into a single image. The containerization framework Docker eases the use of this concept and enables sharing images publicly, gaining high momentum. However, it can lead to users creating and sharing images that include private keys or API secrets—either by mistake or out of negligence. This leakage impairs the creator's security and that of everyone using the image. Yet, the extent of this practice and how to counteract it remains unclear. In this paper, we analyze 337,171 images from Docker Hub and 8,076 other private registries unveiling that 8.5\% of images indeed include secrets. Specifically, we find 52,107 private keys and 3,158 leaked API secrets, both opening a large attack surface, i.e., putting authentication and confidentiality of privacy-sensitive data at stake and even allow active attacks. We further document that those leaked keys are used in the wild: While we discovered 1,060 certificates relying on compromised keys being issued by public certificate authorities, based on further active Internet measurements, we find 275,269 TLS and SSH hosts using leaked private keys for authentication. To counteract this issue, we discuss how our methodology can be used to prevent secret leakage and reuse.}, keywords = {network security; security configuration; secret leakage; container}, tags = {ven2us, internet-of-production,}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-dahlmanns-asiaccs.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (ASIACCS '23), July 10-14, 2023, Melbourne, VIC, Australia}, event_place = {Melbourne, VIC, Australia}, event_name = {ASIA CCS '23}, event_date = {July 10-14, 2023}, ISBN = {979-8-4007-0098-9/23/07}, DOI = {10.1145/3579856.3590329}, reviewed = {1}, author = {Dahlmanns, Markus and Sander, Constantin and Decker, Robin and Wehrle, Klaus} } @Article { Jakobs_2023_3, title = {Preserving the Royalty-Free Standards Ecosystem}, journal = {European Intellectual Property Review}, year = {2023}, month = {7}, volume = {45}, number = {7}, pages = {371-375}, abstract = {It has long been recognized in Europe and elsewhere that standards-development organizations (SDOs) may adopt policies that require their participants to license patents essential to the SDO’s standards (standards-essential patents or SEPs) to manufacturers of standardized products (“implementers”) on a royalty-free (RF) basis. This requirement contrasts with SDO policies that permit SEP holders to charge implementers monetary patent royalties, sometimes on terms that are specified as “fair, reasonable and nondiscriminatory” (FRAND). As demonstrated by two decades of intensive litigation around the world, FRAND royalties have given rise to intractable disputes regarding the manner in which such royalties should be calculated and adjudicated. In contrast, standards distributed on an RF basis are comparatively free from litigation and the attendant transaction costs. Accordingly, numerous SDOs around the world have adopted RF licensing policies and many widely adopted standards, including Bluetooth, USB, IPv6, HTTP, HTML and XML, are distributed on an RF basis. This note briefly discusses the commercial considerations surrounding RF standards, the relationship between RF standards and open source software (OSS) and the SDO policy mechanisms – including “universal reciprocity” -- that enable RF licensing to succeed in the marketplace.}, ISSN = {0142-0461}, DOI = {10.2139/ssrn.4235647}, reviewed = {1}, author = {Contreras, Jorge and Bekkers, Rudi and Biddle, Brad and Bonadio, Enrico and Carrier, Michael A. and Chao, Bernard and Duan, Charles and Gilbert, Richard and Henkel, Joachim and Hovenkamp, Erik and Husovec, Martin and Jakobs, Kai and Kim, Dong-hyu and Lemley, Mark A. and Love, Brian J. and McDonagh, Luke and Scott Morton, Fiona M. and Schultz, Jason and Simcoe, Timothy and Urban, Jennifer M. and Xiang, Joy Y} } @Inproceedings { 2023_pennekamp_benchmarking_comparison, title = {Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking}, year = {2023}, month = {6}, day = {15}, volume = {13901}, pages = {489-505}, abstract = {Benchmarking is an essential tool for industrial organizations to identify potentials that allows them to improve their competitive position through operational and strategic means. However, the handling of sensitive information, in terms of (i) internal company data and (ii) the underlying algorithm to compute the benchmark, demands strict (technical) confidentiality guarantees—an aspect that existing approaches fail to address adequately. Still, advances in private computing provide us with building blocks to reliably secure even complex computations and their inputs, as present in industry benchmarks. In this paper, we thus compare two promising and fundamentally different concepts (hardware- and software-based) to realize privacy-preserving benchmarks. Thereby, we provide detailed insights into the concept-specific benefits. Our evaluation of two real-world use cases from different industries underlines that realizing and deploying secure information systems for industry benchmarking is possible with today's building blocks from private computing.}, note = {Lecture Notes in Computer Science (LNCS), Volume 13901}, keywords = {real-world computing; trusted execution environments; homomorphic encryption; key performance indicators; benchmarking}, tags = {internet-of-production}, url = {https://jpennekamp.de/wp-content/papercite-data/pdf/plv+23.pdf}, publisher = {Springer}, booktitle = {Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE '23), June 12-16, 2023, Zaragoza, Spain}, event_place = {Zaragoza, Spain}, event_name = {35th International Conference on Advanced Information Systems Engineering (CAiSE '23)}, event_date = {June 12-16, 2023}, ISBN = {978-3-031-34559-3}, ISSN = {0302-9743}, DOI = {10.1007/978-3-031-34560-9_29}, reviewed = {1}, author = {Pennekamp, Jan and Lohm{\"o}ller, Johannes and Vlad, Eduard and Loos, Joscha and Rodemann, Niklas and Sapel, Patrick and Fink, Ina Berenice and Schmitz, Seth and Hopmann, Christian and Jarke, Matthias and Schuh, G{\"u}nther and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2023-grote-mvca-fairness, title = {Instant Messaging Meets Video Conferencing: Studying the Performance of IM Video Calls}, year = {2023}, month = {6}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-grote-mvca-fairness.pdf}, publisher = {IFIP/IEEE}, booktitle = {Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '23)}, ISBN = {978-3-903176-58-4}, DOI = {10.23919/TMA58422.2023.10199019}, reviewed = {1}, author = {Grote, Laurenz and Kunze, Ike and Sander, Constantin and Wehrle, Klaus} } @Incollection { 2023_klugewilkes_crd-b2.iv, title = {Modular Control and Services to Operate Line-less Mobile Assembly Systems}, year = {2023}, month = {2}, day = {8}, pages = {303-328}, abstract = {The increasing product variability and lack of skilled workers demand for autonomous, flexible production. Since assembly is considered a main cost driver and accounts for a major part of production time, research focuses on new technologies in assembly. The paradigm of Line-less Mobile Assembly Systems (LMAS) provides a solution for the future of assembly by mobilizing all resources. Thus, dynamic product routes through spatiotemporally configured assembly stations on a shop floor free of fixed obstacles are enabled. In this chapter, we present research focal points on different levels of LMAS, starting with the macroscopic level of formation planning, followed by the mesoscopic level of mobile robot control and multipurpose input devices and the microscopic level of services, such as interpreting autonomous decisions and in-network computing. We provide cross-level data and knowledge transfer through a novel ontology-based knowledge management. Overall, our work contributes to future safe and predictable human-robot collaboration in dynamic LMAS stations based on accurate online formation and motion planning of mobile robots, novel human-machine interfaces and networking technologies, as well as trustworthy AI-based decisions.}, keywords = {Lineless mobile assembly systems (LMAS); Formation planning; Online motion planning; In-network computing; Interpretable AI; Human-machine collaboration; Ontology-based knowledge management}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-klugewilkes-iop-b2.iv.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_13}, reviewed = {1}, author = {Kluge-Wilkes, Aline and Baier, Ralph and Gossen, Daniel and Kunze, Ike and M{\"u}ller, Aleksandra and Shahidi, Amir and Wolfschl{\"a}ger, Dominik and Brecher, Christian and Corves, Burkhard and H{\"u}sing, Mathias and Nitsch, Verena and Schmitt, Robert H. and Wehrle, Klaus} } @Incollection { 2023_pennekamp_crd-a.i, title = {Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead}, year = {2023}, month = {2}, day = {8}, pages = {35-60}, abstract = {The Internet of Production (IoP) leverages concepts such as digital shadows, data lakes, and a World Wide Lab (WWL) to advance today’s production. Consequently, it requires a technical infrastructure that can support the agile deployment of these concepts and corresponding high-level applications, which, e.g., demand the processing of massive data in motion and at rest. As such, key research aspects are the support for low-latency control loops, concepts on scalable data stream processing, deployable information security, and semantically rich and efficient long-term storage. In particular, such an infrastructure cannot continue to be limited to machines and sensors, but additionally needs to encompass networked environments: production cells, edge computing, and location-independent cloud infrastructures. Finally, in light of the envisioned WWL, i.e., the interconnection of production sites, the technical infrastructure must be advanced to support secure and privacy-preserving industrial collaboration. To evolve today’s production sites and lay the infrastructural foundation for the IoP, we identify five broad streams of research: (1) adapting data and stream processing to heterogeneous data from distributed sources, (2) ensuring data interoperability between systems and production sites, (3) exchanging and sharing data with different stakeholders, (4) network security approaches addressing the risks of increasing interconnectivity, and (5) security architectures to enable secure and privacy-preserving industrial collaboration. With our research, we evolve the underlying infrastructure from isolated, sparsely networked production sites toward an architecture that supports high-level applications and sophisticated digital shadows while facilitating the transition toward a WWL.}, keywords = {Cyber-physical production systems; Data streams; Industrial data processing; Industrial network security; Industrial data security; Secure industrial collaboration}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-pennekamp-iop-a.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_2}, reviewed = {1}, author = {Pennekamp, Jan and Belova, Anastasiia and Bergs, Thomas and Bodenbenner, Matthias and B{\"u}hrig-Polaczek, Andreas and Dahlmanns, Markus and Kunze, Ike and Kr{\"o}ger, Moritz and Geisler, Sandra and Henze, Martin and L{\"u}tticke, Daniel and Montavon, Benjamin and Niemietz, Philipp and Ortjohann, Lucia and Rudack, Maximilian and Schmitt, Robert H. and Vroomen, Uwe and Wehrle, Klaus and Zeng, Michael} } @Incollection { 2023_rueppel_crd-b2.ii, title = {Model-Based Controlling Approaches for Manufacturing Processes}, year = {2023}, month = {2}, day = {8}, pages = {221-246}, abstract = {The main objectives in production technology are quality assurance, cost reduction, and guaranteed process safety and stability. Digital shadows enable a more comprehensive understanding and monitoring of processes on shop floor level. Thus, process information becomes available between decision levels, and the aforementioned criteria regarding quality, cost, or safety can be included in control decisions for production processes. The contextual data for digital shadows typically arises from heterogeneous sources. At shop floor level, the proximity to the process requires usage of available data as well as domain knowledge. Data sources need to be selected, synchronized, and processed. Especially high-frequency data requires algorithms for intelligent distribution and efficient filtering of the main information using real-time devices and in-network computing. Real-time data is enriched by simulations, metadata from product planning, and information across the whole process chain. Well-established analytical and empirical models serve as the base for new hybrid, gray box approaches. These models are then applied to optimize production process control by maximizing the productivity under given quality and safety constraints. To store and reuse the developed models, ontologies are developed and a data lake infrastructure is utilized and constantly enlarged laying the basis for a World Wide Lab (WWL). Finally, closing the control loop requires efficient quality assessment, immediately after the process and directly on the machine. This chapter addresses works in a connected job shop to acquire data, identify and optimize models, and automate systems and their deployment in the Internet of Production (IoP).}, keywords = {Process control; Model-based control; Data aggregation; Model identification; Model optimization}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2023/2023-rueppel-iop-b2.i.pdf}, publisher = {Springer}, series = {Interdisciplinary Excellence Accelerator Series}, booktitle = {Internet of Production: Fundamentals, Applications and Proceedings}, ISBN = {978-3-031-44496-8}, DOI = {10.1007/978-3-031-44497-5_7}, reviewed = {1}, author = {R{\"u}ppel, Adrian Karl and Ay, Muzaffer and Biernat, Benedikt and Kunze, Ike and Landwehr, Markus and Mann, Samuel and Pennekamp, Jan and Rabe, Pascal and Sanders, Mark P. and Scheurenberg, Dominik and Schiller, Sven and Xi, Tiandong and Abel, Dirk and Bergs, Thomas and Brecher, Christian and Reisgen, Uwe and Schmitt, Robert H. and Wehrle, Klaus} } @Article { Jakobs_2023_4, title = {The Evolution of Telecom Business, Economy, Policies and Regulations}, journal = {IEEE Communications Magazine}, year = {2023}, volume = {61}, number = {7}, pages = {16-17}, abstract = {From the late 1970s onward, the global telecommunication industry has gone through several waves of regulatory and technological changes. Today, the very definition of telecommunication has changed. First, the traffic is no longer confined to voice and/or limited data services. Second, the boundary line between telecommunication and information sectors is increasingly blurred. Third, the parties that offer products and services for consumers, businesses and industrial users operate under different regulatory regimes, ranging from strict regulations to no regulations at all. Fourth, the merging of the physical and virtual worlds through immersive technologies opens new social, cultural and business dimensions. Finally, the post-covid environment has opened unprecedented avenues for virtual workplaces (E-work).}, DOI = {10.1109/MCOM.2023.10192269}, author = {Ibarrola, Eva and Jakobs, Kai and Sherif, Mostafa Hashem and Sparrell, Duncan} } @Inproceedings { 2023-lorz-cired, title = {Interconnected grid protection systems - reference grid for testing an adaptive protection scheme}, year = {2023}, pages = {3286-3290}, tags = {ven2us}, booktitle = {27th International Conference on Electricity Distribution (CIRED 2023), Rome, Italy, June 12-15, 2023}, event_place = {Rome, Italy}, event_name = {International Conference \& Exhibition on Electricity Distribution (CIRED)}, event_date = {June 12-15, 2023}, DOI = {10.1049/icp.2023.0864}, reviewed = {1}, author = {Lorz, Tobias and Jaeger, Johann and Selimaj, Antigona and Hacker, Immanuel and Ulbig, Andreas and Heckel, Jan-Peter and Becker, Christian and Dahlmanns, Markus and Fink, Ina Berenice and Wehrle, Klaus and Erichsen, Gerrit and Schindler, Michael and Luxenburger, Rainer and Lin, Guosong} } @Inproceedings { 2022-wireless-anycast, title = {Harnessing Cooperative Anycast Communication for Increased Resilience in Wireless Control}, journal = {Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)}, year = {2022}, month = {12}, tags = {reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-glebke-wireless-anycast.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022)}, DOI = {10.1109/CDC51059.2022.9992864}, reviewed = {1}, author = {Glebke, Ren{\'e} and Scheiper, Jan and Lenz, Stefan and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2022-serror-ccs-inside, title = {Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring}, year = {2022}, month = {11}, day = {7}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-serror-ccs-inside.pdf}, publisher = {ACM}, howpublished = {online}, booktitle = {Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security}, event_place = {Los Angeles, CA, USA}, event_date = {November 8, 2022}, DOI = {10.1145/3548606.3563500}, reviewed = {1}, author = {Serror, Martin and Bader, Lennart and Henze, Martin and Schwarze, Arne and N{\"u}rnberger, Kai} } @Inproceedings { 2022-wolsing-ipal, title = {IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems}, year = {2022}, month = {10}, day = {26}, abstract = {The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion detection searches for anomalies in otherwise predictable communication or process behavior. However, current efforts mostly focus on specific domains and protocols, leading to a research landscape broken up into isolated silos. Thus, existing approaches cannot be applied to other industries that would equally benefit from powerful detection. To better understand this issue, we survey 53 detection systems and find no fundamental reason for their narrow focus. Although they are often coupled to specific industrial protocols in practice, many approaches could generalize to new industrial scenarios in theory. To unlock this potential, we propose IPAL, our industrial protocol abstraction layer, to decouple intrusion detection from domain-specific industrial protocols. After proving IPAL’s correctness in a reproducibility study of related work, we showcase its unique benefits by studying the generalizability of existing approaches to new datasets and conclude that they are indeed not restricted to specific domains or protocols and can perform outside their restricted silos.}, url = {/fileadmin/papers/2022/2022-wolsing-ipal.pdf}, booktitle = {Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)}, DOI = {10.1145/3545948.3545968}, reviewed = {1}, author = {Wolsing, Konrad and Wagner, Eric and Saillard, Antoine and Henze, Martin} } @Inproceedings { 2022-rechenberg-cim, title = {Guiding Ship Navigators through the Heavy Seas of Cyberattacks}, year = {2022}, month = {10}, keywords = {Maritime Cybersecurity, Intrusion Detection System, Integrated Bridge System, IEC 61162-450, NMEA 0183}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-rechenberg-guiding.pdf}, web_url = {https://zenodo.org/record/7148794}, publisher = {Zenodo}, booktitle = {European Workshop on Maritime Systems Resilience and Security (MARESEC 2022)}, event_place = {Bremerhaven, Germany}, DOI = {10.5281/zenodo.7148794}, reviewed = {1}, author = {von Rechenberg, Merlin and R{\"o}{\ss}ler, Nina and Schmidt, Mari and Wolsing, Konrad and Motz, Florian and Bergmann, Michael and Padilla, Elmar and Bauer, Jan} } @Proceedings { 2022-wolsing-radarsec, title = {Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset}, year = {2022}, month = {9}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-wolsing-radar.pdf}, publisher = {IEEE}, event_place = {Edmonton, Canada}, event_name = {47th IEEE Conference on Local Computer Networks (LCN)}, event_date = {September 26-29, 2022}, DOI = {10.1109/LCN53696.2022.9843801}, reviewed = {1}, author = {Wolsing, Konrad and Saillard, Antoine and Bauer, Jan and Wagner, Eric and van Sloun, Christian and Fink, Ina Berenice and Schmidt, Mari and Wehrle, Klaus and Henze, Martin} } @Proceedings { 2022-serror-cset, title = {PowerDuck: A GOOSE Data Set of Cyberattacks in Substations}, year = {2022}, month = {8}, day = {8}, pages = {5}, keywords = {data sets, network traffic, smart grid security, IDS}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-serror-cset-powerduck.pdf}, publisher = {ACM}, address = {New York, NY, USA}, howpublished = {online}, event_place = {Virtual}, event_name = {Cyber Security Experimentation and Test Workshop (CSET 2022)}, event_date = {August 8, 2022}, ISBN = {978-1-4503-9684-4/22/08}, DOI = {10.1145/3546096.3546102}, reviewed = {1}, author = {Zemanek, Sven and Hacker, Immanuel and Wolsing, Konrad and Wagner, Eric and Henze, Martin and Serror, Martin} } @Inproceedings { 2022-sander-h3-prio-hol, title = {Analyzing the Influence of Resource Prioritization on HTTP/3 HOL Blocking and Performance}, year = {2022}, month = {6}, day = {27}, tags = {legato}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-sander-h3-prio-hol.pdf}, web_url2 = {https://tma.ifip.org/2022/wp-content/uploads/sites/11/2022/06/tma2022-paper28.pdf}, publisher = {IFIP}, booktitle = {Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '22)}, event_place = {Enschede}, event_name = {Network Traffic Measurement and Analysis Conference}, event_date = {27.06.22-30.06.22}, ISBN = {978-3-903176-47-8}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Wehrle, Klaus} } @Inproceedings { 2022-schemmel-kdalloc, title = {A Deterministic Memory Allocator for Dynamic Symbolic Execution}, year = {2022}, month = {6}, tags = {safe}, url = {https://drops.dagstuhl.de/opus/volltexte/2022/16237/pdf/LIPIcs-ECOOP-2022-9.pdf}, booktitle = {European Conference on Object-Oriented Programming (ECOOP 2022)}, DOI = {10.4230/LIPIcs.ECOOP.2022.9}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Busse, Frank and Nowack, Martin and Cadar, Cristian} } @Inproceedings { WagnerSWH2022, title = {BP-MAC: Fast Authentication for Short Messages}, year = {2022}, month = {5}, day = {18}, pages = {201-206}, url = {/fileadmin/papers/2022/2022-wagner-bpmac.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22)}, event_place = {San Antonio, Texas, USA}, event_name = {15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '22)}, ISBN = {978-1-4503-9216-7/22/05}, DOI = {10.1145/3507657.3528554}, reviewed = {1}, author = {Wagner, Eric and Serror, Martin and Wehrle, Klaus and Henze, Martin} } @Inproceedings { lorenz-ven2us-2022, title = {Interconnected network protection systems - the basis for the reliable and safe operation of distribution grids with a high penetration of renewable energies and electric vehicle}, year = {2022}, abstract = {Power grids are increasingly faced with the introduction of decentralized, highly volatile power supplies from renewable energies and high loads occurring from e-mobility. However, today’s static grid protection cannot manage all upcoming conditions while providing a high level of dependability and security. It forms a bottleneck of a future decarbonizing grid development. In our research project, we develop and verify an adaptive grid protection algorithm. It calculates situation dependent protection parameters for the event of power flow shifts and topology changes caused by volatile power supplies due to the increase of renewable generation and the rapid expansion of e-mobility. As a result the distribution grid can be operated with the optimally adapted protection parameters and functions for changing operating states. To safely adjust the values on protection hardware in the field, i.e., safe from hardware failures and cyberattacks, we research resilient and secure communication concepts for the adaptive and interconnected grid protection system. Finally, we validate our concept and system by demonstrations in the laboratory and field tests.}, tags = {ven2us}, booktitle = {Proceedings of the CIRED workshop on E-mobility and power distribution systems 2022, June 2-3, 2022, Porto, Portugal}, event_place = {Porto}, event_name = {CIRED workshop on E-mobility and power distribution systems 2022}, event_date = {June 2-3, 2022}, DOI = {10.1049/icp.2022.0768}, reviewed = {1}, author = {Lorenz, Matthias and Pletzer, Tobias Markus and Schuhmacher, Malte and Sowa, Torsten and Dahms, Michael and Stock, Simon and Babazadeh, Davood and Becker, Christian and Jaeger, Johann and Lorz, Tobias and Dahlmanns, Markus and Fink, Ina Berenice and Wehrle, Klaus and Ulbig, Andreas and Linnartz, Philipp and Selimaj, Antigona and Offergeld, Thomas} } @Inproceedings { 2021_kiesel_5g, title = {Development of a Model to Evaluate the Potential of 5G Technology for Latency-Critical Applications in Production}, year = {2021}, month = {12}, day = {15}, pages = {739-744}, abstract = {Latency-critical applications in production promise to be essential enablers for performance improvement in production. However, they require the right and often wireless communication system. 5G technology appears to be an effective way to achieve communication system for these applications. Its estimated economic benefit on production gross domestic product is immense ($740 billion Euro until 2030). However, 55\% of production companies state that 5G technology deployment is currently not a subject matter for them and mainly state the lack of knowledge on benefits as a reason. Currently, it is missing an approach or model for a use case specific, data-based evaluation of 5G technology influence on the performance of production applications. Therefore, this paper presents a model to evaluate the potential of 5G technology for latency-critical applications in production. First, we derive requirements for the model to fulfill the decision-makers' needs. Second, we analyze existing evaluation approaches regarding their fulfillment of the derived requirements. Third, based on outlined research gaps, we develop a model fulfilling the requirements. Fourth, we give an outlook for further research needs.}, keywords = {5G technology; latency-critical applications; production; evaluation model}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kiesel-5g-model.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 28th IEEE International Conference on Industrial Engineering and Engineering Management (IEEM '21), December 13-16, 2021, Singapore, Singapore}, event_place = {Singapore, Singapore}, event_date = {December 13-16, 2021}, ISBN = {978-1-6654-3771-4}, DOI = {10.1109/IEEM50564.2021.9673074}, reviewed = {1}, author = {Kiesel, Raphael and Boehm, Falk and Pennekamp, Jan and Schmitt, Robert H.} } @Inproceedings { 2021-krude-nfp-pred, title = {Determination of Throughput Guarantees for Processor-based SmartNICs}, year = {2021}, month = {12}, day = {7}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-krude-nfp-pred.pdf}, publisher = {ACM}, booktitle = {The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21)}, ISBN = {978-1-4503-9098-9/21/12}, DOI = {10.1145/3485983.3494842}, reviewed = {1}, author = {Krude, Johannes and R{\"u}th, Jan and Schemmel, Daniel and Rath, Felix and Folbort, Iohannes-Heorh and Wehrle, Klaus} } @Inproceedings { 2021-kunze-spin-tracker, title = {Tracking the QUIC Spin Bit on Tofino}, year = {2021}, month = {12}, day = {7}, pages = {15–21}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-spin-tracker.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ '21)}, ISBN = {9781450391351}, DOI = {10.1145/3488660.3493804}, reviewed = {1}, author = {Kunze, Ike and Sander, Constantin and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021_pennekamp_bootstrapping, title = {Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships}, year = {2021}, month = {11}, day = {15}, number = {RWTH-2021-09499}, abstract = {In addition to quality improvements and cost reductions, dynamic and flexible business relationships are expected to become more important in the future to account for specific customer change requests or small-batch production. Today, despite reservation, sensitive information must be shared upfront between buyers and sellers. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness following information leaks or breaches of their privacy. To address this issue, the concepts of confidential computing and cloud computing come to mind as they promise to offer scalable approaches that preserve the privacy of participating companies. In particular, designs building on confidential computing can help to technically enforce privacy. Moreover, cloud computing constitutes an elegant design choice to scale these novel protocols to industry needs while limiting the setup and management overhead for practitioners. Thus, novel approaches in this area can advance the status quo of bootstrapping new relationships as they provide privacy-preserving alternatives that are suitable for immediate deployment.}, keywords = {bootstrapping procurement; business relationships; secure industrial collaboration; privacy; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-pennekamp-bootstrapping.pdf}, publisher = {RWTH Aachen University}, booktitle = {Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW '21), co-located with the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS '21), November 15-19, 2021, Seoul, Korea}, institution = {RWTH Aachen University}, event_place = {Seoul, Korea}, event_date = {November 14, 2021}, DOI = {10.18154/RWTH-2021-09499}, author = {Pennekamp, Jan and Fuhrmann, Frederik and Dahlmanns, Markus and Heutmann, Timo and Kreppein, Alexander and Grunert, Dennis and Lange, Christoph and Schmitt, Robert H. and Wehrle, Klaus} } @Inproceedings { 2021-sander-shardingrevisited, title = {Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?}, year = {2021}, month = {11}, day = {2}, tags = {legato}, url = {/fileadmin/papers/2021/2021-sander-sharding-revisited.pdf}, web_url = {https://arxiv.org/abs/2110.14239}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '21)}, event_name = {Internet Measurement Conference 2021}, event_date = {02.11.21 - 04.11.21}, ISBN = {978-1-4503-9129-0/21/11}, DOI = {10.1145/3487552.3487832}, reviewed = {1}, author = {Sander, Constantin and Bl{\"o}cher, Leo and Wehrle, Klaus and R{\"u}th, Jan} } @Proceedings { fink-lcn-demons-2021, title = {DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps}, year = {2021}, month = {10}, day = {4}, tags = {nerd-nrw}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-fink-lcn-demons.pdf}, publisher = {IEEE}, howpublished = {online}, event_place = {Edmonton, Canada}, event_name = {46th IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 4-7, 2021}, DOI = {10.1109/LCN52139.2021.9524879}, reviewed = {1}, author = {Fink, Ina Berenice and Serror, Martin and Wehrle, Klaus} } @Inproceedings { 2021-glebke-service-based-forwarding, title = {Service-based Forwarding via Programmable Dataplanes}, year = {2021}, month = {6}, day = {10}, tags = {reflexes}, url = {/fileadmin/papers/2021/2021-glebke-service-based-forwarding.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21)}, ISBN = {978-1-6654-4005-9}, ISSN = {2325-5609}, DOI = {10.1109/HPSR52026.2021.9481814}, reviewed = {1}, author = {Glebke, Ren{\'e} and Trossen, Dirk and Kunze, Ike and Lou, David and R{\"u}th, Jan and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2021-kunze-coordinate-transformation, title = {Investigating the Applicability of In-Network Computing to Industrial Scenarios}, year = {2021}, month = {5}, day = {11}, pages = {334-340}, keywords = {in-network computing; latency; approximation}, tags = {internet-of-production,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-coordinate-transformation.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS '21)}, ISBN = {978-1-7281-6207-2}, DOI = {10.1109/ICPS49255.2021.9468247}, reviewed = {1}, author = {Kunze, Ike and Glebke, Ren{\'e} and Scheiper, Jan and Bodenbenner, Matthias and Schmitt, Robert H. and Wehrle, Klaus} } @Article { 2021_buckhorst_lmas, title = {Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production}, journal = {Procedia CIRP}, year = {2021}, month = {5}, day = {3}, volume = {99}, pages = {448-453}, abstract = {Assembly systems must provide maximum flexibility qualified by organization and technology to offer cost-compliant performance features to differentiate themselves from competitors in buyers' markets. By mobilization of multipurpose resources and dynamic planning, Line-less Mobile Assembly Systems (LMASs) offer organizational reconfigurability. By proposing a holarchy to combine LMASs with the concept of an Internet of Production (IoP), we enable LMASs to source valuable information from cross-level production networks, physical resources, software nodes, and data stores that are interconnected in an IoP. The presented holarchy provides a concept of how to address future challenges, meet the requirements of shorter lead times, and unique lifecycle support. The paper suggests an application of decision making, distributed sensor services, recommender-based data reduction, and in-network computing while considering safety and human usability alike.}, note = {Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME '20), July 14-17, 2020, Gulf of Naples, Italy}, keywords = {Internet of Production; Line-less Mobile Assembly System; Industrial Assembly; Smart Factory}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-buckhorst-holarchy.pdf}, publisher = {Elsevier}, event_place = {Gulf of Naples, Italy}, event_date = {July 14-17, 2020}, ISSN = {2212-8271}, DOI = {10.1016/j.procir.2021.03.064}, reviewed = {1}, author = {Buckhorst, Armin F. and Montavon, Benjamin and Wolfschl{\"a}ger, Dominik and Buchsbaum, Melanie and Shahidi, Amir and Petruck, Henning and Kunze, Ike and Pennekamp, Jan and Brecher, Christian and H{\"u}sing, Mathias and Corves, Burkhard and Nitsch, Verena and Wehrle, Klaus and Schmitt, Robert H.} } @Inproceedings { 2021-kunze-aqm-tofino-p4, title = {Tofino + P4: A Strong Compound for AQM on High-Speed Networks?}, year = {2021}, month = {5}, pages = {72-80}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-kunze-aqm-tofino-p4.pdf}, publisher = {IFIP/IEEE}, booktitle = {Proceedings of the International Symposium on Integrated Network Management (IM '21)}, event_place = {Virtual Event}, event_name = {International Symposium on Integrated Network Management (IM '21)}, event_date = {May 2021}, ISBN = {978-1-7281-9041-9}, reviewed = {1}, author = {Kunze, Ike and Gunz, Moritz and Saam, David and Wehrle, Klaus and R{\"u}th, Jan} } @Inproceedings { 2021_dahlmanns_entrust, title = {Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems}, year = {2021}, month = {4}, day = {28}, pages = {78–87}, abstract = {The ongoing digitization of industrial manufacturing leads to a decisive change in industrial communication paradigms. Moving from traditional one-to-one to many-to-many communication, publish/subscribe systems promise a more dynamic and efficient exchange of data. However, the resulting significantly more complex communication relationships render traditional end-to-end security futile for sufficiently protecting the sensitive and safety-critical data transmitted in industrial systems. Most notably, the central message brokers inherent in publish/subscribe systems introduce a designated weak spot for security as they can access all communication messages. To address this issue, we propose ENTRUST, a novel solution for key server-based end-to-end security in publish/subscribe systems. ENTRUST transparently realizes confidentiality, integrity, and authentication for publish/subscribe systems without any modification of the underlying protocol. We exemplarily implement ENTRUST on top of MQTT, the de-facto standard for machine-to-machine communication, showing that ENTRUST can integrate seamlessly into existing publish/subscribe systems.}, keywords = {cyber-physical system security; publish-subscribe security; end-to-end security}, tags = {internet-of-production, rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-dahlmanns-entrust.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS '21), co-located with the 11th ACM Conference on Data and Application Security and Privacy (CODASPY '21), April 26-28, 2021, Virtual Event, USA}, event_place = {Virtual Event, USA}, event_name = {ACM Workshop on Secure and Trustworthy Cyber-Physical Systems}, event_date = {April 28, 2021}, ISBN = {978-1-4503-8319-6/21/04}, DOI = {10.1145/3445969.3450423}, reviewed = {1}, author = {Dahlmanns, Markus and Pennekamp, Jan and Fink, Ina Berenice and Schoolmann, Bernd and Wehrle, Klaus and Henze, Martin} } @Inproceedings { 2021-sander-zoom-cc, title = {Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM}, year = {2021}, month = {3}, tags = {internet-of-production}, url = {/fileadmin/papers/2021/2021-sander-zoom-fairness-aqm.pdf}, web_url = {https://arxiv.org/abs/2107.00904}, publisher = {Springer}, booktitle = {Proceedings of the Passive and Active Measurement Conference (PAM '21)}, event_name = {Passive and Active Measurement Conference (PAM 2021)}, DOI = {10.1007/978-3-030-72582-2_1}, reviewed = {1}, author = {Sander, Constantin and Kunze, Ike and Wehrle, Klaus and R{\"u}th, Jan} } @Phdthesis { 2021-serror-phd-thesis, title = {On the Benefits of Cooperation for Dependable Wireless Communications}, year = {2021}, month = {3}, web_url = {https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-7923-4}, publisher = {Shaker Verlag}, address = {Shaker Verlag, D{\"u}ren, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {21}, school = {RWTH Aachen University}, type = {Ph.D. Thesis}, ISBN = {978-3-8440-7923-4}, author = {Serror, Martin} } @Article { 2021_schomakers_insights, title = {Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives}, journal = {Computer Law Review International}, year = {2021}, month = {2}, day = {15}, volume = {22}, number = {1}, pages = {8-15}, abstract = {Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to ''special categories'' of data. This article assesses the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as ''potentially sensitive.'' The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. The key findings here suggest the GDPR adequately protecting users' privacy but for small adjustments.}, tags = {Information Sensitivity, Privacy, European Data Protection Law}, ISSN = {1610-7608}, DOI = {10.9785/cri-2021-220103}, reviewed = {1}, author = {Schomakers, Eva-Maria and Lidynia, Chantal and M{\"u}llmann, Dirk and Matzutt, Roman and Wehrle, Klaus and Spiecker gen. D{\"o}hmann, Indra and Ziefle, Martina} } @Inproceedings { 2019_rut_schomakers_privacy, title = {Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity}, year = {2021}, month = {1}, day = {27}, pages = {857-870}, abstract = {Social media, cloud computing, and the Internet of Things connect people around the globe, offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for users' privacy. From the users' perspective, the consequences of data disclosure depend on the perceived sensitivity of that data. But in light of the new technological opportunities to process and combine data, it is questionable whether users can adequately evaluate risks of data disclosures. As mediating authority, data protection laws such as the European General Data Protection Regulation try to protect user data, granting enhanced protection to ''special categories'' of data. In this paper, we assess the legal, technological, and users' perspectives on information sensitivity and their interplay. Technologically, all data can be referred to as ''potentially sensitive.'' The legal and users' perspective on information sensitivity deviate from this standpoint, as some data types are granted special protection by law but are not perceived as very sensitive by users and vice versa. Our key findings still suggest the GDPR adequately protecting users' privacy but for small adjustments.}, keywords = {Information Sensitivity,Privacy,European Data Protection Law}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2021/2021-schomakers-3perspectives.pdf}, web_url = {https://dl.gi.de/handle/20.500.12116/34788}, web_url2 = {https://arxiv.org/abs/1911.06569}, publisher = {Gesellschaft f{\"u}r Informatik}, address = {Bonn}, booktitle = {INFORMATIK 2020}, event_place = {Karlsruhe, Germany}, event_name = {INFORMATIK 2020}, event_date = {2020-09-28 to 2020-10-01}, language = {English}, DOI = {10.18420/inf2020_76}, reviewed = {1}, author = {Schomakers, Eva-Maria and Lidynia, Chantal and M{\"u}llmann, Dirk and Matzutt, Roman and Wehrle, Klaus and Spiecker gen. D{\"o}hmann, Indra and Ziefle, Martina} } @Inproceedings { 2020_pennekamp_benchmarking, title = {Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking}, year = {2020}, month = {12}, day = {15}, pages = {31-44}, abstract = {Benchmarking the performance of companies is essential to identify improvement potentials in various industries. Due to a competitive environment, this process imposes strong privacy needs, as leaked business secrets can have devastating effects on participating companies. Consequently, related work proposes to protect sensitive input data of companies using secure multi-party computation or homomorphic encryption. However, related work so far does not consider that also the benchmarking algorithm, used in today's applied real-world scenarios to compute all relevant statistics, itself contains significant intellectual property, and thus needs to be protected. Addressing this issue, we present PCB — a practical design for Privacy-preserving Company Benchmarking that utilizes homomorphic encryption and a privacy proxy — which is specifically tailored for realistic real-world applications in which we protect companies' sensitive input data and the valuable algorithms used to compute underlying key performance indicators. We evaluate PCB's performance using synthetic measurements and showcase its applicability alongside an actual company benchmarking performed in the domain of injection molding, covering 48 distinct key performance indicators calculated out of hundreds of different input values. By protecting the privacy of all participants, we enable them to fully profit from the benefits of company benchmarking.}, keywords = {practical encrypted computing; homomorphic encryption; algorithm confidentiality; benchmarking; key performance indicators; industrial application; Internet of Production}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-pennekamp-company-benchmarking.pdf}, web_url = {https://eprint.iacr.org/2020/1512}, publisher = {HomomorphicEncryption.org}, booktitle = {Proceedings of the 8th Workshop on Encrypted Computing \& Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event}, event_place = {Virtual Event}, event_date = {December 15, 2020}, ISBN = {978-3-00-067798-4}, DOI = {10.25835/0072999}, reviewed = {1}, author = {Pennekamp, Jan and Sapel, Patrick and Fink, Ina Berenice and Wagner, Simon and Reuter, Sebastian and Hopmann, Christian and Wehrle, Klaus and Henze, Martin} } @Proceedings { fink-lcn-demons-2020, title = {Extending MUD to Smartphones}, year = {2020}, month = {11}, day = {15}, tags = {nerd-nrw}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-fink-lcn-mud-smartphone.pdf}, publisher = {IEEE}, howpublished = {online}, event_place = {Sydney, Australia}, event_name = {45th IEEE Conference on Local Computer Networks (LCN)}, event_date = {November 16-19, 2020}, DOI = {10.1109/LCN48667.2020.9314782}, reviewed = {1}, author = {Fink, Ina Berenice and Serror, Martin and Wehrle, Klaus} } @Article { serror-iiotsec-tii-2020, title = {Challenges and Opportunities in Securing the Industrial Internet of Things}, journal = {IEEE Transactions on Industrial Informatics}, year = {2020}, month = {9}, day = {11}, volume = {17}, number = {5}, pages = {2985-2996}, tags = {nerd-nrw}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-serror-tii-iiotsec.pdf}, web_url = {https://ieeexplore.ieee.org/document/9195014}, howpublished = {online}, ISSN = {1941-0050}, DOI = {10.1109/TII.2020.3023507}, reviewed = {1}, author = {Serror, Martin and Hack, Sacha and Henze, Martin and Schuba, Marko and Wehrle, Klaus} } @Inproceedings { 2020-kirchhof-wowmom-ccncps, title = {Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation}, year = {2020}, month = {8}, day = {31}, tags = {internet-of-production, reflexes}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-kirchhof-wireless-mac-improvements.pdf}, publisher = {IEEE Computer Society}, howpublished = {online}, booktitle = {International Symposium on a World of Wireless, Mobile and Multimedia Networks: Workshop on Communication, Computing, and Networking in Cyber Physical Systems (WoWMoM-CCNCPS'2020), August 31 - September 3, 2020, Cork, Ireland}, event_place = {Cork, Ireland}, event_date = {August 31 - September 3, 2020}, DOI = {10.1109/WoWMoM49955.2020.00068}, reviewed = {1}, author = {Kirchhof, J{\"o}rg Christian and Serror, Martin and Glebke, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2020-schemmel-porse, title = {Symbolic Partial-Order Execution for Testing Multi-Threaded Programs}, year = {2020}, month = {7}, tags = {symbiosys}, url = {https://arxiv.org/pdf/2005.06688.pdf}, web_url2 = {https://arxiv.org/abs/2005.06688}, booktitle = {Computer Aided Verification (CAV 2020)}, event_name = {32nd International Conference on Computer Aided Verification}, DOI = {10.1007/978-3-030-53288-8_18}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Rodr{\'i}guez, C{\'e}sar and Laprell, David and Wehrle, Klaus} } @Inproceedings { 2020-serror-networking-qwin, title = {QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation}, year = {2020}, month = {6}, day = {21}, tags = {consent}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-serror-qwin.pdf}, web_url = {https://ieeexplore.ieee.org/abstract/document/9142792}, publisher = {IFIP}, howpublished = {online}, booktitle = {Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING '20), June 22-26, 2020, Paris, France}, event_place = {Paris, France}, event_name = {IFIP NETWORKING Conference}, event_date = {June 22-26, 2020}, ISBN = {978-3-903176-28-7}, reviewed = {1}, author = {Serror, Martin and Wagner, Eric and Glebke, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2020-mann-ur-weldseamstudy, title = {Study on weld seam geometry control for connected gas metal arc welding systems}, year = {2020}, month = {6}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-weld-seam-geometry-control.pdf}, booktitle = {Proceedings of the 2020 Internal Conference on Ubiquitous Robots}, event_name = {Internal Conference on Ubiquitous Robots}, event_date = {June 22-26, 2020}, DOI = {10.1109/UR49135.2020.9144839}, reviewed = {1}, author = {Mann, Samuel and Glebke, Ren{\'e} and Kunze, Ike and Scheurenberg, Dominik and Sharma, Rahul and Reisgen, Uwe and Wehrle, Klaus and Abel, Dirk} } @Article { 2020_gleim_factDAG, title = {FactDAG: Formalizing Data Interoperability in an Internet of Production}, journal = {IEEE Internet of Things Journal}, year = {2020}, month = {4}, day = {14}, volume = {7}, number = {4}, pages = {3243-3253}, abstract = {In the production industry, the volume, variety and velocity of data as well as the number of deployed protocols increase exponentially due to the influences of IoT advances. While hundreds of isolated solutions exist to utilize this data, e.g., optimizing processes or monitoring machine conditions, the lack of a unified data handling and exchange mechanism hinders the implementation of approaches to improve the quality of decisions and processes in such an interconnected environment. The vision of an Internet of Production promises the establishment of a Worldwide Lab, where data from every process in the network can be utilized, even interorganizational and across domains. While numerous existing approaches consider interoperability from an interface and communication system perspective, fundamental questions of data and information interoperability remain insufficiently addressed. In this paper, we identify ten key issues, derived from three distinctive real-world use cases, that hinder large-scale data interoperability for industrial processes. Based on these issues we derive a set of five key requirements for future (IoT) data layers, building upon the FAIR data principles. We propose to address them by creating FactDAG, a conceptual data layer model for maintaining a provenance-based, directed acyclic graph of facts, inspired by successful distributed version-control and collaboration systems. Eventually, such a standardization should greatly shape the future of interoperability in an interconnected production industry.}, keywords = {Data Management; Data Versioning; Interoperability; Industrial Internet of Things; Worldwide Lab}, tags = {internet-of-production}, url = {https://comsys.rwth-aachen.de/fileadmin/papers/2020/2020-gleim-iotj-iop-interoperability.pdf}, publisher = {IEEE}, ISSN = {2327-4662}, DOI = {10.1109/JIOT.2020.2966402}, reviewed = {1}, author = {Gleim, Lars and Pennekamp, Jan and Liebenberg, Martin and Buchsbaum, Melanie and Niemietz, Philipp and Knape, Simon and Epple, Alexander and Storms, Simon and Trauth, Daniel and Bergs, Thomas and Brecher, Christian and Decker, Stefan and Lakemeyer, Gerhard and Wehrle, Klaus} } @Article { 2020_mann_welding_layers, title = {Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers}, journal = {Advanced Structured Materials}, year = {2020}, month = {4}, day = {1}, volume = {125}, pages = {101-118}, abstract = {A connected, digitalized welding production unlocks vast and dynamic potentials: from improving state of the art welding to new business models in production. For this reason, offering frameworks, which are capable of addressing multiple layers of applications on the one hand and providing means of data security and privacy for ubiquitous dataflows on the other hand, is an important step to enable the envisioned advances. In this context, welding production has been introduced from the perspective of interlaced process layers connecting information sources across various entities. Each layer has its own distinct challenges from both a process view and a data perspective. Besides, investigating each layer promises to reveal insight into (currently unknown) process interconnections. This approach has been substantiated by methods for data security and privacy to draw a line between secure handling of data and the need of trustworthy dealing with sensitive data among different parties and therefore partners. In conclusion, the welding production has to develop itself from an accumulation of local and isolated data sources towards a secure industrial collaboration in an Internet of Production.}, note = {Proceedings of the 1st International Conference on Advanced Joining Processes (AJP '19)}, keywords = {Welding Production; Industrie 4.0; Internet of Production; Data Security; Data Privacy}, tags = {Internet-of-Production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2020/2020-mann-welding-layers.pdf}, publisher = {Springer}, event_place = {Ponta Delgada, Azores, Portugal}, event_date = {October 24-25, 2019}, ISBN = {978-981-15-2956-6}, ISSN = {1869-8433}, DOI = {10.1007/978-981-15-2957-3_8}, reviewed = {1}, author = {Mann, Samuel and Pennekamp, Jan and Brockhoff, Tobias and Farhang, Anahita and Pourbafrani, Mahsa and Oster, Lukas and Uysal, Merih Seran and Sharma, Rahul and Reisgen, Uwe and Wehrle, Klaus and van der Aalst, Wil} } @Article { 2020-wehrle-digitalshadows, title = {Mit ''Digitalen Schatten'' Daten verdichten und darstellen : Der Exzellenzcluster ''Internet der Produktion'' forscht {\"u}ber die Produktionstechnik hinaus}, journal = {Der Profilbereich ''Information \& Communication Technology''}, year = {2020}, ISSN = {0179-079X}, DOI = {10.18154/RWTH-2021-02496}, author = {Jarke, Matthias and van der Aalst, Wil and Brecher, Christian and Brockmann, Matthias and Koren, Istv{\'a}n and Lakemeyer, Gerhard and Rumpe, Bernhard and Schuh, G{\"u}nther and Wehrle, Klaus and Ziefle, Martina} } @Inproceedings { 2019-glebke-in-network-cv, title = {Towards Executing Computer Vision Functionality on Programmable Network Devices}, year = {2019}, month = {12}, day = {9}, tags = {reflexes,maki,internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-in-network-cv.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP '19)}, language = {en}, ISBN = {978-1-4503-7000-4/19/12}, DOI = {10.1145/3359993.3366646}, reviewed = {1}, author = {Glebke, Ren{\'e} and Krude, Johannes and Kunze, Ike and R{\"u}th, Jan and Senger, Felix and Wehrle, Klaus} } @Inproceedings { 2019_pennekamp_dataflows, title = {Dataflow Challenges in an Internet of Production: A Security \& Privacy Perspective}, year = {2019}, month = {11}, day = {11}, pages = {27-38}, abstract = {The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in the area of manufacturing across institutional boundaries to realize benefits such as increased profit margins and product quality as well as reduced product development costs and time to market. This interconnection of CPS will lead to a plethora of new dataflows, especially between (partially) distrusting entities. In this paper, we identify and illustrate these envisioned inter-organizational dataflows and the participating entities alongside two real-world use cases from the production domain: a fine blanking line and a connected job shop. Our analysis allows us to identify distinct security and privacy demands and challenges for these new dataflows. As a foundation to address the resulting requirements, we provide a survey of promising technical building blocks to secure inter-organizational dataflows in an IoP and propose next steps for future research. Consequently, we move an important step forward to overcome security and privacy concerns as an obstacle for realizing the promised potentials in an Internet of Production.}, keywords = {Internet of Production; dataflows; Information Security}, tags = {internet-of-production}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-pennekamp-dataflows.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC '19), co-located with the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom}, event_place = {London, United Kingdom}, event_date = {November 11-15, 2019}, ISBN = {978-1-4503-6831-5/19/11}, DOI = {10.1145/3338499.3357357}, reviewed = {1}, author = {Pennekamp, Jan and Henze, Martin and Schmidt, Simo and Niemietz, Philipp and Fey, Marcel and Trauth, Daniel and Bergs, Thomas and Brecher, Christian and Wehrle, Klaus} } @Book { 2019-stoffers-dissertation, title = {Automated Optimization of Discrete Event Simulations without Knowing the Model}, year = {2019}, month = {10}, keywords = {Discrete Event Simulation; Parallelization; Memoization}, tags = {memosim}, web_url = {https://www.shaker.de/de/content/catalogue/index.asp?ISBN=978-3-8440-6973-0}, editor = {Klaus Wehrle}, publisher = {Shaker}, series = {Reports on Communications and Distributed Systems}, language = {en}, ISBN = {978-3-8440-6973-0}, reviewed = {1}, author = {Stoffers, Mirko} } @Inproceedings { 2019-sander-depcci, title = {DeePCCI: Deep Learning-based Passive Congestion Control Identification}, year = {2019}, month = {8}, day = {18}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-sander-deepcci.pdf}, web_url2 = {https://arxiv.org/abs/1907.02323}, publisher = {ACM}, booktitle = {In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI \& ML (NetAI '19)}, event_place = {Beijing, China}, event_name = {Workshop on Network Meets AI \& ML}, event_date = {18.08.2019}, DOI = {10.1145/3341216.3342211}, reviewed = {1}, author = {Sander, Constantin and R{\"u}th, Jan and Hohlfeld, Oliver and Wehrle, Klaus} } @Techreport { 2019-rueth-blitzstart, title = {Blitz-starting QUIC Connections}, year = {2019}, month = {5}, day = {8}, number2 = {arXiv:1905.03144 [cs.NI]}, pages = {1--8}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf}, web_url = {https://arxiv.org/abs/1905.03144}, misc2 = {Online}, publisher = {COMSYS, RWTH Aachen University}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {COMSYS, RWTH Aachen University}, type = {Technical Report}, language = {en}, author = {R{\"u}th, Jan and Wolsing, Konrad and Serror, Martin and Wehrle, Klaus and Hohlfeld, Oliver} } @Techreport { 2019-hohlfeld-santa-tr, title = {Application-Agnostic Offloading of Packet Processing}, year = {2019}, month = {4}, day = {1}, number2 = {arXiv:1904.00671 [cs.NI]}, pages = {1--14}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf}, web_url = {https://arxiv.org/abs/1904.00671}, misc2 = {Online}, publisher = {COMSYS, RWTH Aachen University}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {COMSYS, RWTH Aachen University}, type = {Technical Report}, language = {en}, author = {Hohlfeld, Oliver and Reelfs, Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2019-glebke-wirelessgain, title = {Enabling Wireless Network Support for Gain Scheduled Control}, year = {2019}, month = {3}, day = {25}, tags = {reflexes,spp}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-glebke-wirelessgain.pdf}, publisher = {ACM}, booktitle = {In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)}, event_place = {Dresden, Germany}, event_name = {International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019)}, event_date = {25.03.2019}, DOI = {10.1145/3301418.3313943}, reviewed = {1}, author = {Gallenm{\"u}ller, Sebastian and Glebke, Ren{\'e} and G{\"u}nther, Stephan and Hauser, Eric and Leclaire, Maurice and Reif, Stefan and R{\"u}th, Jan and Schmidt, Andreas and Carle, Georg and Herfet, Thorsten and Schr{\"o}der-Preikschat, Wolfgang and Wehrle, Klaus} } @Article { 2019_wehrle_dagstuhl_beginners, title = {The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research}, journal = {ACM SIGCOMM Computer Communication Review}, year = {2019}, month = {1}, volume = {49}, number = {1}, pages = {24-30}, abstract = {Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.}, ISSN = {0146-4833}, DOI = {10.1145/3314212.3314217}, author = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus} } @Proceedings { 2018-QuicTesting, title = {Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution}, year = {2018}, month = {12}, day = {4}, tags = {erc,symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rath-quictesting.pdf}, web_url = {https://dl.acm.org/citation.cfm?id=3284853}, web_url2 = {https://arxiv.org/abs/1811.12099}, publisher = {ACM}, event_place = {Heraklion, Greece}, event_name = {EPIQ'18 Workshop Paper}, event_date = {4.12.2018}, language = {en}, ISBN = {978-1-4503-6082-1}, DOI = {10.1145/3284850.3284853}, reviewed = {1}, author = {Rath, Felix and Schemmel, Daniel and Wehrle, Klaus} } @Inproceedings { 2018-tzimmermann-toplists, title = {A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists}, year = {2018}, month = {10}, day = {31}, tags = {maki}, url = {https://dl.acm.org/citation.cfm?id=3278574}, web_url = {https://arxiv.org/abs/1805.11506}, publisher = {ACM}, booktitle = {Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA}, event_place = {Boston, US}, event_name = {Internet Measurement Conference 2018}, event_date = {31.10.18 - 2.11.18}, language = {en}, DOI = {10.1145/3278532.3278574}, reviewed = {1}, author = {Scheitle, Quirin and Hohlfeld, Oliver and Gamba, Julien and Jelten, Jonas and Zimmermann, Torsten and Strowes, Stephen D. and Vallina-Rodriguez, Narseo} } @Article { 2018-stoffers-on-automated-memoization, title = {On Automated Memoization in the Field of Simulation Parameter Studies}, journal = {ACM Transactions on Modeling and Computer Simulation (TOMACS)}, year = {2018}, month = {10}, volume = {28}, number = {4}, number2 = {Article 26}, pages = {26:1-26:25}, tags = {memosim,symbiosys}, url = {file:2213}, DOI = {10.1145/3186316}, reviewed = {1}, author = {Stoffers, Mirko and Schemmel, Daniel and Soria Dustmann, Oscar and Wehrle, Klaus} } @Inproceedings { 2018-hiller-lcn-lowlatencyiiot, title = {Secure Low Latency Communication for Constrained Industrial IoT Scenarios}, year = {2018}, month = {10}, tags = {connect,iop,nerd-nrw}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-lcn-secure_low_latency_communication_iiot.pdf}, publisher = {IEEE}, booktitle = {43rd IEEE Conference on Local Computer Networks (LCN), Chicago, USA}, event_place = {Chicago, USA}, event_name = {43nd IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 1-4, 2018}, language = {en}, ISBN = {978-1-5386-4413-3}, DOI = {10.1109/LCN.2018.8638027}, reviewed = {1}, author = {Hiller, Jens and Henze, Martin and Serror, Martin and Wagner, Eric and Richter, Jan Niklas and Wehrle, Klaus} } @Inproceedings { 2018-hohlfeld-santa, title = {Application-Agnostic Offloading of Datagram Processing}, year = {2018}, month = {9}, day = {3}, tags = {maki,ssiclops,reflexes}, url = {https://ieeexplore.ieee.org/document/8493053}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {International Teletraffic Congress ITC 30}, event_date = {03.09.2018 - 07-09.2018}, language = {en}, DOI = {10.1109/ITC30.2018.00015}, reviewed = {1}, author = {Hohlfeld, Oliver and Reelfs, Jens Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2018-soria-dustmann-parti, title = {PARTI: A Multi-interval Theory Solver for Symbolic Execution}, year = {2018}, month = {9}, tags = {symbiosys}, url = {file:2195}, booktitle = {Proceedings of the 2018 Conference on Automated Software Engineering (ASE'18)}, DOI = {10.1145/3238147.3238179}, reviewed = {1}, author = {Soria Dustmann, Oscar and Wehrle, Klaus and Cadar, Cristian} } @Inproceedings { 2018-serror-ares-iotsec, title = {Towards In-Network Security for Smart Homes}, year = {2018}, month = {8}, day = {27}, tags = {consent, iotrust}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-iotsecfor-in-network-security.pdf}, publisher = {ACM}, howpublished = {online}, booktitle = {Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), co-located with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany}, event_place = {Hamburg, Germany}, event_name = {International Conference on Availability, Reliability and Security}, event_date = {August 27--30, 2018}, ISBN = {978-1-4503-6448-5}, DOI = {10.1145/3230833.3232802}, reviewed = {1}, author = {Serror, Martin and Henze, Martin and Hack, Sacha and Schuba, Marko and Wehrle, Klaus} } @Inproceedings { 2018-krude-circuit, title = {Circuit Switched VM Networks for Zero-Copy IO}, year = {2018}, month = {8}, day = {20}, pages = {1-7}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-krude-xocks.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2018 Afternoon Workshop on Kernel Bypassing Networks (KBNets'18)}, event_place = {Budapest, Hungary}, event_name = {Afternoon Workshop on Kernel Bypassing Networks}, event_date = {20.8.2018}, DOI = {10.1145/3229538.3229539}, reviewed = {1}, author = {Krude, Johannes and Stoffers, Mirko and Wehrle, Klaus} } @Inproceedings { 2018-cav-schemmel-liveness, title = {Symbolic Liveness Analysis of Real-World Software}, year = {2018}, month = {7}, day = {14}, tags = {symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-schemmel-symbolic-liveness-analysis-of-real-world-software.pdf}, booktitle = {Computer Aided Verification (CAV 2018)}, event_place = {Oxford, Great Britain}, event_name = {30th International Conference on Computer Aided Verification}, event_date = {2018-07-14 to 2018-07-17}, language = {en}, DOI = {10.1007/978-3-319-96142-2_27}, reviewed = {1}, author = {Schemmel, Daniel and B{\"u}ning, Julian and Soria Dustmann, Oscar and Noll, Thomas and Wehrle, Klaus} } @Article { 2018-serror-tvt-fb, title = {Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks}, journal = {IEEE Transactions on Vehicular Technology}, year = {2018}, month = {7}, volume = {67}, number = {7}, pages = {5778-5792}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-tvt-fbl-performance.pdf}, publisher = {IEEE}, howpublished = {online}, ISSN = {0018-9545}, DOI = {10.1109/TVT.2018.2794178}, reviewed = {1}, author = {Hu, Yulin and Serror, Martin and Wehrle, Klaus and Gross, James} } @Inproceedings { 2018-serror-wowmom-relaying, title = {Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency}, year = {2018}, month = {6}, day = {11}, tags = {iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-serror-wowmom-relaying.pdf}, publisher = {IEEE}, howpublished = {online}, booktitle = {19th IEEE International Symposium on ''A World of Wireless, Mobile and Multimedia Networks'' (IEEE WoWMoM 2018), Chania, Greece}, event_place = {Chania, Crete, Greece}, event_name = {WoWMoM}, event_date = {June 12-15, 2018}, ISBN = {978-1-5386-4725-7}, DOI = {10.1109/WoWMoM.2018.8449807}, reviewed = {1}, author = {Serror, Martin and Vaa{\ss}en, Sebastian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2018-hiller-ic2e-cpplintegration, title = {Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud}, year = {2018}, month = {4}, day = {19}, pages = {241-249}, tags = {ssiclops,iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf}, web_url = {https://ieeexplore.ieee.org/document/8360335}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA}, event_place = {Orlando, Florida, USA}, event_name = {2018 IEEE International Conference on Cloud Engineering (IC2E 2018)}, event_date = {2018-04-19}, ISBN = {978-1-5386-5008-0}, DOI = {10.1109/IC2E.2018.00050}, reviewed = {1}, author = {Hiller, Jens and Kimmerlin, Mael and Plauth, Max and Heikkila, Seppo and Klauck, Stefan and Lindfors, Ville and Eberhardt, Felix and Bursztynowski, Dariusz and Santos, Jesus Llorente and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2018-cpsbench-schemmel-equiv, title = {Towards Benchmark Optimization by Automated Equivalence Detection}, year = {2018}, month = {4}, day = {10}, tags = {symbiosys,reflexes}, url = {file:2196}, booktitle = {Proceedings of the 1st Workshop on Benchmarking Cyber-Physical Networks and Systems (CPSBench'18)}, event_place = {Porto, Portugal}, event_name = {1st Workshop on Benchmarking Cyber-Physical Networks and Systems}, event_date = {2018-04-10}, ISBN = {978-1-5386-6742-2}, DOI = {10.1109/CPSBench.2018.00011}, reviewed = {1}, author = {Schemmel, Daniel and Glebke, Ren{\'e} and Stoffers, Mirko and Wehrle, Klaus} } @Article { 2018-scheitle-ccr-caa, title = {A First Look at Certification Authority Authorization (CAA)}, journal = {ACM SIGCOMM Computer Communications Review (CCR)}, year = {2018}, month = {4}, volume = {48}, pages = {10-23}, note = {https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf}, tags = {internet-measurements}, url = {https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf}, web_url = {https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/}, web_url_date = {2018-06-05}, DOI = {10.1145/3213232.3213235}, reviewed = {1}, author = {Scheitle, Quirin and Chung, Taejoong and Hiller, Jens and Gasser, Oliver and Naab, Johannes and van Rijswijk-Deij, Roland and Hohlfeld, Oliver and Holz, Ralph and Choffnes, Dave and Mislove, Alan and Carle, Georg} } @Inproceedings { 2017-poormohammady, title = {Dynamic Algorithm Selection for the Logic of Tasks in IoT Stream Processing Systems}, journal = {13th International Conference on Network and Service Management}, year = {2017}, month = {11}, day = {26}, misc2 = {Online}, publisher = {IEEE}, booktitle = {13th International Conference on Network and Service Management, Tokyo, Japan}, language = {en}, DOI = {10.23919/CNSM.2017.8256009}, reviewed = {1}, author = {Poormohammady, Ehsan and Reelfs, Jens Helge and Stoffers, Mirko and Wehrle, Klaus and Papageorgiou, Apostolos} } @Inproceedings { 2017-liew-schemmel-fp, title = {Floating-Point Symbolic Execution: A Case Study in N-Version Programming}, year = {2017}, month = {10}, day = {30}, tags = {symbiosys}, url = {file:1848}, booktitle = {Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering}, event_place = {Urbana-Champaign, IL, USA}, language = {en}, ISBN = {978-1-5386-2684-9/17}, reviewed = {1}, author = {Liew, Daniel and Schemmel, Daniel and Cadar, Cristian and Donaldson, Alastair and Z{\"a}hl, Rafael and Wehrle, Klaus} } @Inproceedings { 2017-stoffers-dsrt-memo-ident, title = {Automated Memoization: Automatically Identifying Memoization Units in Simulation Parameter Studies}, year = {2017}, month = {10}, day = {18}, pages = {33-42}, keywords = {Automatic Memoization; Accelerating Parameter Studies; Performance Prediction}, tags = {memosim,symbiosys}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-stoffers-dsrt-memo-ident.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 21st IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT 2017), Rome, Italy}, event_place = {Rome, Italy}, language = {en}, DOI = {10.1109/DISTRA.2017.8167664}, reviewed = {1}, author = {Stoffers, Mirko and Bettermann, Ralf and Wehrle, Klaus} } @Conference { 2017-fink-brainlab-gmds, title = {BrainLab - Ein Framework f{\"u}r mobile neurologische Untersuchungen}, year = {2017}, month = {8}, day = {29}, note = {Best Abstract Award}, web_url = {https://www.egms.de/static/en/meetings/gmds2017/17gmds137.shtml}, web_url_date = {06.09.19}, publisher = {German Medical Science GMS Publishing House (2017)}, booktitle = {62. Jahrestagung der Deutschen Gesellschaft f{\"u}r Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS).}, event_place = {Oldenburg}, event_name = {GMDS 2017}, event_date = {17-21 September 2017}, DOI = {10.3205/17gmds137}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinski, Thomas and Titgemeyer, Yannic and Ramos, Roann and Kutafina, Ekaterina and Bitsch, J{\'o} Agila and Jonas, Stephan Michael} } @Proceedings { 2017-SymPerfPoster, title = {SymPerf: Predicting Network Function Performance}, year = {2017}, month = {8}, day = {21}, tags = {spp,erc,symbiosys,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-rath-sym-perf-poster.pdf}, publisher = {ACM}, event_place = {Los Angeles, USA}, event_name = {ACM SIGCOMM 2017 Poster}, event_date = {21.8.2017 - 25.8.2017}, language = {en}, ISBN = {978-1-4503-5057-0/17/08}, DOI = {10.1145/3123878.3131977}, reviewed = {1}, author = {Rath, Felix and Krude, Johannes and R{\"u}th, Jan and Schemmel, Daniel and Hohlfeld, Oliver and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Article { 2017-ziegeldorf-bmcmedgenomics-bloom, title = {BLOOM: BLoom filter based Oblivious Outsourced Matchings}, journal = {BMC Medical Genomics}, year = {2017}, month = {7}, day = {26}, volume = {10}, number = {Suppl 2}, pages = {29-42}, abstract = {Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-Bloom and PHE-Bloom, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-Bloom is fully secure in the semi-honest model while PHE-Bloom slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-Bloom is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (\(\sigma\)=8.73 s) with our first approach and a mere 0.07 s (\(\sigma\)=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-Bloom, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-Bloom, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude.}, note = {Proceedings of the 5th iDASH Privacy and Security Workshop 2016}, keywords = {Secure outsourcing; Homomorphic encryption; Bloom filters}, tags = {sscilops; mynedata; rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-ziegeldorf-bmcmedgenomics-bloom.pdf}, misc2 = {Online}, publisher = {BioMed Central}, event_place = {Chicago, IL, USA}, event_date = {November 11, 2016}, language = {en}, ISSN = {1755-8794}, DOI = {10.1186/s12920-017-0277-y}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Pennekamp, Jan and Hellmanns, David and Schwinger, Felix and Kunze, Ike and Henze, Martin and Hiller, Jens and Matzutt, Roman and Wehrle, Klaus} } @Inproceedings { 2017-henze-tma-cloudemail, title = {Veiled in Clouds? Assessing the Prevalence of Cloud Computing in the Email Landscape}, year = {2017}, month = {6}, day = {21}, tags = {trinics, ssiclops}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-henze-tma-cloudemail.pdf}, misc2 = {Online}, publisher = {IEEE / IFIP}, booktitle = {Proceedings of the 2017 Network Traffic Measurement and Analysis Conference (TMA 2017), Dublin, Ireland}, language = {en}, ISBN = {978-3-901882-95-1}, DOI = {10.23919/TMA.2017.8002910}, reviewed = {1}, author = {Henze, Martin and Sanford, Mary Peyton and Hohlfeld, Oliver} } @Inproceedings { 2017-zimmermann-secon, title = {Resource and Execution Control for Mobile Offloadee Devices}, year = {2017}, month = {6}, day = {12}, tags = {maki}, publisher = {IEEE}, booktitle = {14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), San Diego, USA}, event_place = {San Diego, USA}, event_name = {14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017)}, event_date = {12.06.2017 - 14.06.2017}, language = {en}, ISBN = {978-1-5090-6599-8}, DOI = {10.1109/SAHCN.2017.7964939}, reviewed = {1}, author = {Zimmermann, Torsten and Wirtz, Hanno and Ziegeldorf, Jan Henrik and Steinhaus, Christian and Wehrle, Klaus} } @Article { dombrowski-vdi, title = {Funktechnologien f{\"u}r Industrie 4.0}, journal = {VDE Positionspapier}, year = {2017}, month = {6}, day = {1}, publisher = {VDE - Verband der Elektrotechnik, Elektronik, Informationstechnik e.V.}, address = {Stresemannallee 15, 60596 Frankfurt am Main, Germany}, author = {Aktas, Ismet and Bentkus, Alexander and Bonanati, Florian and Dekorsy, Armin and Dombrowski, Christian and Doubrava, Michael and Golestani, Ali and Hofmann, Frank and Heidrich, Mike and Hiensch, Stefan and Kays, R{\"u}diger and Meyer, Michael and M{\"u}ller, Andreas and ten Brink, Stephan and Petreska, Neda and Popovic, Milan and Rauchhaupt, Lutz and Saad, Ahmad and Schotten, Hans and W{\"o}ste, Christoph and Wolff, Ingo} } @Inproceedings { 2017-serror-pads-cows, title = {Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping}, year = {2017}, month = {5}, day = {24}, tags = {memosim,symbiosys}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-pads-cows.pdf}, publisher = {ACM}, howpublished = {online}, booktitle = {Proceedings of the 5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17), Singapore, Singapore}, event_place = {Singapore, Singapore}, event_name = {5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17)}, event_date = {May 24-26, 2017}, ISBN = {978-1-4503-4489-0}, DOI = {10.1145/3064911.3064913}, reviewed = {1}, author = {Serror, Martin and Kirchhof, J{\"o}rg Christian and Stoffers, Mirko and Wehrle, Klaus and Gross, James} } @Inproceedings { 2017-serror-ew-koi, title = {From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication}, year = {2017}, month = {5}, day = {17}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-serror-radio-design-ew17.pdf}, publisher = {IEEE}, booktitle = {Proc. of 23rd European Wireless Conference (EW17), Dresden, Germany}, event_place = {Dresden, Germany}, event_name = {Proc. of 23rd European Wireless Conference (EW17)}, event_date = {17.-19. May 2017}, reviewed = {1}, author = {Ashraf, Shehzad Ali and Wang, Y.-P. Eric and Eldessoki, Sameh and Holfeld, Bernd and Parruca, Donald and Serror, Martin and Gross, James} } @Conference { 2017-fink-brainlab, title = {BrainLab – towards mobile brain research}, year = {2017}, month = {4}, day = {24}, pages = {2}, url = {/fileadmin/papers/2017/2017-fink-brainlab.pdf}, web_url2 = {http://informaticsforhealth.org/wp-content/uploads/2017/04/IFH2017-Digital-Programme.pdf}, web_url2_date = {2017-05-09}, misc2 = {Online}, booktitle = {Informatics for Health 2017, Manchester UK}, event_place = {Manchester, UK}, event_name = {Informatics for Health 2017, Manchester UK}, event_date = {24-26 April 2017}, language = {en}, reviewed = {1}, author = {Fink, Ina Berenice and Hankammer, Bernd and Stopinsky, Thomas and Ramos, Roann and Kutafina, Ekaterina and Bitsch Link, J{\'o} Agila and Jonas, Stephan} } @Proceedings { 2017-serror-netsys-industrial, title = {Demo: A Realistic Use-case for Wireless Industrial Automation and Control}, year = {2017}, month = {3}, day = {16}, tags = {koi}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/Ansari_et_al_Wireless_Industrial_Automation_Demo_NetSys_2017.pdf}, publisher = {IEEE}, event_place = {G{\"o}ttingen, Germany}, event_name = {International Conference on Networked Systems (NetSys 2017)}, DOI = {10.1109/NetSys.2017.7931496}, reviewed = {1}, author = {Ansari, Junaid and Aktas, Ismet and Brecher, Christian and Pallasch, Christoph and Hoffmann, Nicolai and Obdenbusch, Markus and Serror, Martin and Wehrle, Klaus and Gross, James} } @Incollection { 2016-iiot-rueth-comm, title = {Communication and Networking for the Industrial Internet of Things}, year = {2017}, pages = {317-346}, misc2 = {Online}, editor = {Jeschke, Sabina and Brecher, Christian and Song, Houbing and Rawat, Danda B.}, publisher = {Springer}, booktitle = {Industrial Internet of Things}, language = {en}, ISBN = {978-3-319-42558-0}, DOI = {10.1007/978-3-319-42559-7_12}, reviewed = {1}, author = {R{\"u}th, Jan and Schmidt, Florian and Serror, Martin and Wehrle, Klaus and Zimmermann, Torsten} } @Inproceedings { 2017-matzutt-mynedata, title = {myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data}, year = {2017}, pages = {1073-1084}, abstract = {Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.}, note = {Presentation slides are in German}, keywords = {Personal User Data, Personal Information Management, Data Protection Laws, Privacy Enhancing Technologies, Platform Design, Profiling}, tags = {mynedata_show}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2017/2017-matzutt-informatik-mynedata.pdf}, web_url = {https://www.comsys.rwth-aachen.de/fileadmin/misc/mynedata/talks/2017-matzutt-informatik-mynedata-presentation.pdf}, web_url_date = {Presentation slides}, editor = {Eibl, Maximilian and Gaedke, Martin}, publisher = {Gesellschaft f{\"u}r Informatik, Bonn}, booktitle = {INFORMATIK 2017}, event_place = {Chemnitz}, event_name = {INFORMATIK 2017}, event_date = {2017-09-28}, language = {English}, ISBN = {978-3-88579-669-5}, ISSN = {1617-5468}, DOI = {10.18420/in2017_109}, reviewed = {1}, author = {Matzutt, Roman and M{\"u}llmann, Dirk and Zeissig, Eva-Maria and Horst, Christiane and Kasugai, Kai and Lidynia, Sean and Wieninger, Simon and Ziegeldorf, Jan Henrik and Gudergan, Gerhard and Spiecker gen. D{\"o}hmann, Indra and Wehrle, Klaus and Ziefle, Martina} } @Inproceedings { 2016-henze-cloudcom-trinics, title = {Towards Transparent Information on Individual Cloud Service Usage}, year = {2016}, month = {12}, day = {12}, pages = {366-370}, tags = {trinics}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-cloudcom-trinics.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg}, language = {en}, ISBN = {978-1-5090-1445-3}, DOI = {10.1109/CloudCom.2016.0064}, reviewed = {1}, author = {Henze, Martin and Kerpen, Daniel and Hiller, Jens and Eggert, Michael and Hellmanns, David and M{\"u}hmer, Erik and Renuli, Oussama and Maier, Henning and St{\"u}ble, Christian and H{\"a}u{\ss}ling, Roger and Wehrle, Klaus} } @Inproceedings { 2016-ahmed-sensys-poster-incremental, title = {Poster Abstract: Incremental Checkpointing for Interruptible Computations}, year = {2016}, month = {11}, day = {14}, pages = {1--2}, abstract = {We propose incremental checkpointing techniques enabling transiently powered devices to retain computational state across multiple activation cycles. As opposed to the existing approaches, which checkpoint complete program state, the proposed techniques keep track of modified RAM locations to incrementally update the retained state in secondary memory, significantly reducing checkpointing overhead both in terms of time and energy.}, url = {/fileadmin/misc/2016/2016-ahmed-sensys-poster-incremental.pdf}, web_url = {http://dl.acm.org/citation.cfm?id=2996701}, web_url_date = {2016-11-20}, web_url2 = {http://sensys.acm.org/2016/}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016), Stanford, CA, USA}, event_place = {Stanford, CA, USA}, event_name = {Sensys '16}, event_date = {November 14-16, 2016}, language = {en}, ISBN = {978-1-4503-4263-6/16/11}, DOI = {http://dx.doi.org/10.1145/2994551.2996701}, reviewed = {1}, author = {Ahmed, Saad and Khan, Hassan and Siddiqui, Junaid Haroon and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad} } @Inproceedings { 2016-henze-wpes-cppl, title = {CPPL: Compact Privacy Policy Language}, year = {2016}, month = {10}, day = {24}, pages = {99-110}, tags = {ssiclops}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-henze-wpes-cppl.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), co-located with the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria}, language = {en}, ISBN = {978-1-4503-4569-9}, DOI = {10.1145/2994620.2994627}, reviewed = {1}, author = {Henze, Martin and Hiller, Jens and Schmerling, Sascha and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Article { 2015-cheng-piap-jmu, title = {Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening}, journal = {JMIR Mhealth Uhealth}, year = {2016}, month = {7}, day = {20}, volume = {4}, number = {3}, pages = {e88}, tags = {piap}, web_url = {http://mhealth.jmir.org/2016/3/e88/}, web_url2 = {http://www.ncbi.nlm.nih.gov/pubmed/27439444}, misc2 = {Online}, language = {en}, ISSN = {2291-5222}, DOI = {10.2196/mhealth.5284}, reviewed = {1}, author = {Cheng, Paula Glenda Ferrer and Ramos, Roann Munoz and Bitsch Link, J{\'o} Agila and Jonas, Stephan Michael and Ix, Tim and See, Portia Lynn Quetulio and Wehrle, Klaus} } @Inproceedings { 2016-serror-wowmom-arq, title = {Performance Analysis of Cooperative ARQ Systems for Wireless Industrial Networks}, year = {2016}, month = {6}, day = {21}, tags = {koi}, publisher = {IEEE}, howpublished = {online}, booktitle = {17th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2016), Coimbra, Portugal}, event_place = {Coimbra, Portugal}, language = {en}, DOI = {10.1109/WoWMoM.2016.7523534}, reviewed = {1}, author = {Serror, Martin and Hu, Yulin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2016-werner-networking-stean, title = {STEAN: A Storage and Transformation Engine for Advanced Networking Context}, year = {2016}, month = {5}, day = {17}, tags = {maki}, publisher = {IEEE}, booktitle = {Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), Vienna, Austira}, event_place = {Vienna, Austria}, event_name = {IFIP Networking 2016}, event_date = {17.-19.5.2016}, ISBN = {978-3-9018-8283-8}, DOI = {10.1109/IFIPNetworking.2016.7497203}, reviewed = {1}, author = {Werner, Marc and Schwandtke, Johannes and Hollick, Matthias and Hohlfeld, Oliver and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2016-stoffers-pads-memo, title = {Automated Memoization for Parameter Studies Implemented in Impure Languages}, year = {2016}, month = {5}, day = {15}, pages = {221-232}, note = {Best Paper Award}, keywords = {Automatic Memoization; Accelerating Parameter Studies; Impure Languages}, tags = {memosim,symbiosys}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2016/2016-stoffers-pads-memoization.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 4th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’16), Banff, AB, Canada}, event_place = {Banff, AB, Canada}, language = {en}, DOI = {10.1145/2901378.2901386}, reviewed = {1}, author = {Stoffers, Mirko and Schemmel, Daniel and Soria Dustmann, Oscar and Wehrle, Klaus} } @Article { 2016-kunz-tomacs-horizon, title = {Parallel Expanded Event Simulation of Tightly Coupled Systems}, journal = {ACM Transactions on Modeling and Computer Simulation (TOMACS)}, year = {2016}, month = {1}, volume = {26}, number = {2}, pages = {12:1--12:26}, abstract = {The technical evolution of wireless communication technology and the need for accurately modeling these increasingly complex systems causes a steady growth in the complexity of simulation models. At the same time, multi-core systems have become the de facto standard hardware platform. Unfortunately, wireless systems pose a particular challenge for parallel execution due to a tight coupling of network entities in space and time. Moreover, model developers are often domain experts with no in-depth understanding of parallel and distributed simulation. In combination, both aspects severely limit the performance and the efficiency of existing parallelization techniques. We address these challenges by presenting parallel expanded event simulation, a novel modeling paradigm that extends discrete events with durations which span a period in simulated time. The resulting expanded events form the basis for a conservative synchronization scheme that considers overlapping expanded events eligible for parallel processing. We furthermore put these concepts into practice by implementing Horizon, a parallel expanded event simulation framework specifically tailored to the characteristics of multi-core systems. Our evaluation shows that Horizon achieves considerable speedups in synthetic as well as real-world simulation models and considerably outperforms the current state-of-the-art in distributed simulation.}, keywords = {Parallel discrete event simulation, Multi-core Systems, Wireless Systems, Simulation Modeling Paradigm, Conservative Synchronization}, tags = {horizon}, publisher = {ACM}, language = {en}, DOI = {10.1145/2832909}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Landsiedel, Olaf and Wehrle, Klaus and Gross, James} } @Phdthesis { 2015-schmidt-heuristic-header-recovery, title = {Heuristic Header Recovery for Corrupted Network Packets}, year = {2015}, month = {12}, day = {31}, tags = {refector}, publisher = {Shaker Verlag GmbH}, address = {Aachen, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {12}, school = {RWTH Aachen University}, institute = {Chair of Communication and Distributed Systems}, type = {Ph.D. Thesis}, ISBN = {978-3844041743}, author = {Schmidt, Florian} } @Inproceedings { 2015-serror-channel-coding, title = {Channel Coding Versus Cooperative ARQ: Reducing Outage Probability in Ultra-Low Latency Wireless Communications}, year = {2015}, month = {12}, tags = {koi}, url = {file:1704}, publisher = {IEEE}, howpublished = {online}, booktitle = {IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications (GC'15 - ULTRA2), San Diego, USA}, event_place = {San Diego, USA}, event_name = {IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications}, event_date = {December 6-10 2015}, DOI = {10.1109/GLOCOMW.2015.7414150}, reviewed = {1}, author = {Serror, Martin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-stoffers-mswim-data-deps, title = {Data Dependency based Parallel Simulation of Wireless Networks}, year = {2015}, month = {11}, day = {2}, pages = {291-300}, abstract = {Simulation of wireless systems is highly complex and can only be efficient if the simulation is executed in parallel. To this end, independent events have to be identified to enable their simultaneous execution. Hence, the number of events identified as independent needs to be maximized in order to increase the level of parallelism. Traditionally, dependencies are determined only by time and location of events: If two events take place on the same simulation entity, they must be simulated in timestamp order. Our approach to overcome this limitation is to also investigate data-dependencies between events. This enables event reordering and parallelization even for events at the same simulation entity. To this end, we design the simulation language PSimLa, which aids this process. In this paper, we discuss the PSimLa design and compiler as well as our data-dependency analysis approach in detail and present case studies of wireless network models, speeded up by a factor of 10 on 12 cores where time-based parallelization only achieves a 1.6x speedup.}, note = {Best Paper Award}, keywords = {Parallel simulation; Static code analysis; Data dependencies}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-mswim-data-deps.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Canc{\'u}n, Mexico (MSWiM'15)}, event_place = {Canc{\'u}n, Mexico}, language = {en}, DOI = {10.1145/2811587.2811593}, reviewed = {1}, author = {Stoffers, Mirko and Sehy, Torsten and Gross, James and Wehrle, Klaus} } @Inproceedings { 2015-wirtz-wifi-sharing, title = {Collaborative On-demand Wi-Fi Sharing}, year = {2015}, month = {10}, pages = {19-27}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-lcn-cows.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA}, event_place = {Clearwater Beach, Florida, USA}, event_name = {40th IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 26-29 2015}, language = {en}, DOI = {10.1109/LCN.2015.7366279}, reviewed = {1}, author = {Wirtz, Hanno and Zimmermann, Torsten and Serror, Martin and Wehrle, Klaus} } @Poster { serror-zdn-2015, title = {How to Benefit from Cooperation in Latency-Constrained Wireless Communications}, year = {2015}, month = {9}, day = {25}, tags = {cps,koi,hodrian}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-serror-zdn-cooperation.pdf}, web_url = {http://kn.inf.uni-tuebingen.de/itg-zdn-2015-poster-session}, publisher = {VDE}, howpublished = {online}, organization = {ITG-Fachtagung ''Zukunft der Netze 2015'' – Poster Session, T{\"u}bingen, Germany}, event_place = {T{\"u}bingen, Germany}, author = {Serror, Martin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-schmidt-santa, title = {Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]}, year = {2015}, month = {8}, day = {19}, tags = {ssiclops}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom}, event_place = {London, United Kingdom}, event_name = {43rd ACM SIGCOMM Conference (SIGCOMM '15)}, event_date = {17–21 August, 2015}, language = {en}, DOI = {10.1145/2785956.2790014}, reviewed = {1}, author = {Schmidt, Florian and Hohlfeld, Oliver and Glebke, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2015-wirtz-secon, title = {Enabling Ubiquitous Interaction with Smart Things}, year = {2015}, month = {6}, day = {24}, pages = {256-264}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf}, web_url = {http://www.comsys.rwth-aachen.de/short/secon15-stif}, misc2 = {Online}, publisher = {IEEE}, booktitle = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA}, event_place = {Seattle, USA}, event_name = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015)}, event_date = {22.06.2015 - 25.06.2015}, language = {en}, DOI = {10.1109/SAHCN.2015.7338324}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Serror, Martin and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2015-wowmom-schumacher-warpsim, title = {WARPsim: A Code-Transparent Network Simulator for WARP Devices}, year = {2015}, month = {6}, day = {14}, tags = {cps,koi}, url = {file:1688}, publisher = {IEEE}, howpublished = {online}, booktitle = {16th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks: Demos (IEEE WoWMoM 2015 - Demos), Boston, USA}, event_place = {Boston, USA}, event_name = {IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks}, event_date = {14.-17. June 2015}, DOI = {10.1109/WoWMoM.2015.7158181}, reviewed = {1}, author = {Schumacher, Andreas and Serror, Martin and Dombrowski, Christian and Gross, James} } @Inproceedings { 2015-stoffers-pads-data-deps, title = {Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation}, year = {2015}, month = {6}, day = {10}, pages = {73-74}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-pads-data-deps.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom}, event_place = {London, United Kingdom}, language = {en}, DOI = {10.1145/2769458.2769487}, reviewed = {1}, author = {Stoffers, Mirko and Sehy, Torsten and Gross, James and Wehrle, Klaus} } @Inproceedings { 2015-bitsch-phealth-brain, title = {Towards Brain Research in a Pocket: Bringing EEG Research and Diagnostics out of the Lab}, year = {2015}, month = {6}, day = {2}, volume = {211}, pages = {185 -- 190}, abstract = {Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment. We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach.}, url = {fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf}, misc = {Print}, editor = {Blobel, Bernd and Lind{\'e}n, Maria and Ahmed, Mobyen Uddin}, publisher = {IOS Press}, address = {Amsterdam}, series = {Studies in Health Technology and Informatics}, booktitle = {Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_place = {V{\"a}ster{\aa}s, Sweden}, event_name = {12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_date = {June 2-4, 2015}, language = {en}, ISBN = {978-1-61499-515-9}, ISSN = {0926-9630}, DOI = {10.3233/978-1-61499-516-6-185}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Severijns, Cassandra and Wehrle, Klaus} } @Inproceedings { virtualcoordinate_li_lin_stoffers_gross_2015, title = {Channel-Aware Virtual Coordinates Assignment Protocol and Routing in Multi-Hop Cognitive Radio Network}, year = {2015}, month = {5}, day = {20}, url = {http://dl.ifip.org/db/conf/networking/networking2015/1570067591.pdf}, misc2 = {Online}, publisher = {IFIP}, address = {Laxenburg, Austria}, booktitle = {Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France}, event_place = {Toulouse, France}, language = {en}, DOI = {10.1109/IFIPNetworking.2015.7145337}, reviewed = {1}, author = {Li, Di and Lin, Zhichao and Stoffers, Mirko and Gross, James} } @Proceedings { 2015-sdnflex-heuschkel-dyns, title = {Protocol Virtualization through Dynamic Network Stacks}, year = {2015}, month = {3}, day = {9}, publisher = {IEEE}, event_place = {Cottbus}, event_name = {SDNFlex Workshop (NetSys 2015)}, event_date = {March 2015, 9-12}, language = {en}, DOI = {10.1109/NetSys.2015.7089055}, reviewed = {1}, author = {Heuschkel, Jens and Schweizer, Immanuel and Zimmermann, Torsten and Wehrle, Klaus and M{\"u}hlh{\"a}user, Max} } @Inproceedings { 2015-ewsn-schmidt-canttaketheheat, title = {If You Can't Take The Heat: Temperature Effects On Low-Power Wireless Networks And How To Mitigate Them}, year = {2015}, month = {2}, day = {10}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-ewsn-canttaketheheat.pdf}, misc2 = {Online}, publisher = {Springer}, booktitle = {Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal}, event_place = {Porto, Portugal}, event_name = {12th European Conference on Wireless Sensor Networks (EWSN 2015)}, event_date = {9-11 February, 2015}, language = {en}, ISBN = {978-3-319-15581-4}, DOI = {10.1007/978-3-319-15582-1_19}, reviewed = {1}, author = {Schmidt, Florian and Ceriotti, Matteo and Hauser, Niklas and Wehrle, Klaus} } @Phdthesis { 2015-schimdt-phdthesis, title = {Heuristic Header Error Recovery for Corrupted Network Packets}, year = {2015}, school = {RWTH Aachen University}, author = {Schmidt, Florian} } @Techreport { 2015-aib-schmidt-hotbox, title = {HotBox: Testing Temperature Effects in Sensor Networks}, year = {2014}, month = {12}, day = {4}, number = {AIB-2014-14}, number2 = {arXiv:1412.2257 [cs.NI]}, pages = {1--17}, tags = {senserr}, url = {fileadmin/papers/2014/2014-schmidt-aib-hotbox.pdf}, misc2 = {Online}, publisher = {Department of Computer Science, RWTH Aachen}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {Department of Computer Science, RWTH Aachen}, type = {Technical Report}, language = {en}, ISSN = {0935-3232}, author = {Schmidt, Florian and Ceriotti, Matteo and Hauser, Niklas and Wehrle, Klaus} } @Conference { Schumacher2014, title = {A Code-transparent MAC Simulator for WARP}, year = {2014}, month = {11}, day = {19}, tags = {hodrian,cps}, booktitle = {Proc. of European workshop on testbed based wireless research}, event_place = {Stockholm, Sweden}, event_name = {European workshop on testbed based wireless research}, event_date = {19/11/2014}, author = {Schumacher, Andreas and Dombrowski, Christian and Gross, James} } @Inproceedings { 2014-aktas-wintech-a-framework-for-remote-automation-configuration-and-monitoring, title = {A Framework for Remote Automation, Configuration, and Monitoring of Real-World Experiments}, year = {2014}, month = {9}, day = {7}, pages = {1--8}, tags = {crawler}, url = {fileadmin/papers/2014/2014-aktas-wintech-remote-cross-layer.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 9th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2014), Hawaii, USA}, event_place = {Hawaii, USA}, event_name = {9th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2014)}, event_date = {7 September 2014}, language = {en}, ISBN = {978-1-4503-3072-5}, DOI = {10.1145/2643230.2643236}, reviewed = {1}, author = {Aktas, Ismet and Pu{\~n}al, Oscar and Schmidt, Florian and Dr{\"u}ner, Tobias and Wehrle, Klaus} } @Inproceedings { 2014-chants-wirtz-disco, title = {Opportunistic Interaction in the Challenged Internet of Things}, year = {2014}, month = {9}, day = {7}, pages = {1-8}, url = {fileadmin/papers/2014/2014-wirtz-chants-challenged_iot.pdf}, misc2 = {online}, publisher = {ACM}, booktitle = {Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, USA}, event_place = {Maui, Hawaii, USA}, event_name = {Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014)}, event_date = {7 September 2014}, language = {en}, ISBN = {978-1-4503-3071-8}, DOI = {10.1145/2645672.2645679}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Serror, Martin and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2014-stoffers-omnet-parallel-inet, title = {Enabling Distributed Simulation of OMNeT++ INET Models}, year = {2014}, month = {9}, day = {3}, url = {http://arxiv.org/pdf/1409.0994}, misc = {arXiv:1409.0994}, misc2 = {Online}, publisher = {Cornell University}, address = {Ithaca, New York, United States}, booktitle = {Proceedings of the 1st OMNeT++ Community Summit, Hamburg, Germany}, event_place = {Hamburg, Germany}, language = {en}, author = {Stoffers, Mirko and Bettermann, Ralf and Gross, James and Wehrle, Klaus} } @Inproceedings { 2014-hummen-delegation, title = {Delegation-based Authentication and Authorization for the IP-based Internet of Things}, year = {2014}, month = {6}, day = {30}, pages = {284-292}, tags = {iotsec; sensorcloud}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014)}, event_place = {Singapore}, event_name = {11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014)}, event_date = {30.06. - 03.07.2014}, language = {en}, DOI = {10.1109/SAHCN.2014.6990364}, reviewed = {1}, author = {Hummen, Ren{\'e} and Shafagh, Hossein and Raza, Shahid and Voigt, Thiemo and Wehrle, Klaus} } @Inproceedings { 2014-schmidt-piccett, title = {Piccett: Protocol-Independent Classification of Corrupted Error-Tolerant Traffic}, year = {2014}, month = {6}, day = {24}, tags = {refector}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-schmidt-iscc-piccett.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal}, language = {en}, DOI = {10.1109/ISCC.2014.6912582}, reviewed = {1}, author = {Schmidt, Florian and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2014-aktas-punal-wowmom-machine-learning-based-jamming-detection-for-80211-conference, title = {Machine Learning-based Jamming Detection for IEEE 802.11: Design and Experimental Evaluation}, journal = {Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia}, year = {2014}, month = {6}, day = {16}, pages = {1--10}, tags = {crawler}, url = {fileadmin/papers/2014/2014-aktas-wowmom-jammingdetection.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia}, event_place = {Sydney}, event_name = {15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14)}, event_date = {16-19 June, 2014}, language = {en}, reviewed = {1}, author = {Pu{\~n}al, Oscar and Aktas, Ismet and Schnelke, Caj-Julian and Abidin, Gloria and Gross, James and Wehrle, Klaus} } @Conference { 2014-hohlfeld-harvester, title = {The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape}, year = {2014}, month = {6}, url = {http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf}, web_url = {http://asiaccs2014.nict.go.jp/}, publisher = {ACM}, booktitle = {9th ACM Symposium on Information, Computer and Communications Security}, DOI = {10.1145/2590296.2590302}, reviewed = {1}, author = {Stringhini, Gianluca and Hohlfeld, Oliver and Kruegel, Christopher and Vigna, Giovanni} } @Inproceedings { 2014-stoffers-simutools-distributed-horizon, title = {Large-Scale Network Simulation: Leveraging the Strengths of Modern SMP-based Compute Clusters}, year = {2014}, month = {3}, day = {17}, pages = {31-40}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-stoffers-simutools-distributed-horizon.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SIMUTools'14), Lisbon, Portugal}, event_place = {Lisbon, Portugal}, language = {en}, ISBN = {978-1-63190-007-5}, DOI = {10.4108/icst.simutools.2014.254622}, reviewed = {1}, author = {Stoffers, Mirko and Schmerling, Sascha and Kunz, Georg and Gross, James and Wehrle, Klaus} } @Techreport { 2013-schmidt-rtp-extended, title = {Support for Error Tolerance in the Real-Time Transport Protocol}, year = {2013}, month = {12}, day = {20}, number = {AIB-2013-19}, number2 = {arXiv:1312.5892 [cs.NI]}, pages = {1--24}, tags = {refector}, url = {fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf}, misc2 = {Online}, publisher = {Department of Computer Science, RWTH Aachen}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {Department of Computer Science, RWTH Aachen}, type = {Technical Report}, language = {en}, ISSN = {0935-3232}, author = {Schmidt, Florian and Orlea, David and Wehrle, Klaus} } @Techreport { 2013-draft-hummen-dtls-extended-session-resumption-01, title = {Extended DTLS Session Resumption for Constrained Network Environments}, year = {2013}, month = {10}, day = {18}, number = {draft-hummen-dtls-extended-session-resumption-01}, abstract = {This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Hummen, Ren{\'e} and Gilger, Johannes and Shafagh, Hossein} } @Article { 2013-elsevir-aktas-harnessing-cross-layer-design, title = {Harnessing Cross-Layer Design}, journal = {Elsevir Ad-hoc Networks}, year = {2013}, month = {10}, day = {1}, tags = {crawler}, reviewed = {1}, author = {Aktas, Ismet and Alizai, Muhammad Hamad and Schmidt, Florian and Wirtz, Hanno and Wehrle, Klaus} } @Article { 2013-raza-lithe, title = {Lithe: Lightweight Secure CoAP for the Internet of Things}, journal = {IEEE Sensors Journal}, year = {2013}, month = {10}, volume = {13}, number = {10}, pages = {3711-3720}, keywords = {Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security}, tags = {iotsec}, language = {en}, ISSN = {1530-437X}, DOI = {10.1109/JSEN.2013.2277656}, reviewed = {1}, author = {Raza, Shahid and Shafagh, Hossein and Hewage, Kasun and Hummen, Ren{\'e} and Voigt, Thiemo} } @Inproceedings { 2013-wintech-schmidt-senserr, title = {Bit Error Distribution and Mutation Patterns of Corrupted Packets in Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {30}, pages = {49--56}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-schmidt-wintech-errors.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)}, event_date = {30 September 2013}, language = {en}, DOI = {10.1145/2505469.2505475}, reviewed = {1}, author = {Schmidt, Florian and Ceriotti, Matteo and Wehrle, Klaus} } @Techreport { 2013-draft-garcia-core-security-06, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {9}, day = {11}, number = {draft-garcia-core-security-06}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-06}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2013-smith-extremecom-demo, title = {Demo: Opportunistic Deployment Support for Wireless Sensor Networks}, year = {2013}, month = {8}, day = {24}, pages = {1--2}, note = {won ''coolest demo award''}, url = {fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf}, misc = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 5th Extreme Conference on Communication}, event_place = {Thorsmork, Iceland}, event_name = {5th Extreme Conference on Communication}, event_date = {August 24-30, 2013}, language = {en}, ISBN = {978-1-4503-2171-6}, reviewed = {1}, author = {Smith, Paul and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { Dombrowski2013WiOpt, title = {Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications}, year = {2013}, month = {5}, day = {13}, pages = {341-348}, keywords = {energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi}, booktitle = {11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013)}, event_place = {Tsukuba Science City, Japan}, language = {English}, reviewed = {1}, author = {Dombrowski, Christian and Petreska, Neda and G{\"o}rtzen, Simon and Schmeink, Anke and Gross, James} } @Inproceedings { 2013-hummen-towards, title = {Towards Viable Certificate-based Authentication for the Web of Things}, year = {2013}, month = {4}, day = {19}, tags = {iotsec}, url = {fileadmin/papers/2013/2013-hummen-towards.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)}, event_place = {Budapest, Hungary}, event_name = {2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy}, language = {en}, ISBN = {978-1-4503-2003-0}, DOI = {10.1145/2463183.2463193}, reviewed = {1}, author = {Hummen, Ren{\'e} and Ziegeldorf, Jan Henrik and Shafagh, Hossein and Raza, Shahid and Wehrle, Klaus} } @Inproceedings { 2013-hummen-6lowpan, title = {6LoWPAN Fragmentation Attacks and Mitigation Mechanisms}, year = {2013}, month = {4}, day = {17}, tags = {iotsec; sensorcloud}, url = {fileadmin/papers/2013/2013-hummen-6lowpan.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)}, event_place = {Budapest, Hungary}, event_name = {6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)}, language = {en}, ISBN = {978-1-4503-1998-0}, DOI = {10.1145/2462096.2462107}, reviewed = {1}, author = {Hummen, Ren{\'e} and Hiller, Jens and Wirtz, Hanno and Henze, Martin and Shafagh, Hossein and Wehrle, Klaus} } @Inproceedings { 2013-schmidt-wons-rtp, title = {A Heuristic Header Error Recovery Scheme for RTP}, year = {2013}, month = {3}, day = {19}, pages = {186--190}, tags = {refector}, url = {fileadmin/papers/2013/2013-schmidt-wons-rtp-refector.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13), Banff, Canada}, event_place = {Banff, Canada}, event_name = {10th International Conference on Wireless On-demand Network Systems and Services (WONS'13)}, event_date = {17-20 March 2013}, language = {en}, ISBN = {978-1-4799-0747-2}, DOI = {10.1109/WONS.2013.6578345}, reviewed = {1}, author = {Schmidt, Florian and Orlea, David and Wehrle, Klaus} } @Techreport { 2013-draft-garcia-core-security-05, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {3}, day = {11}, number = {draft-garcia-core-security-05}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-05}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Phdthesis { 2013-sasnaukas-phdthesis, title = {Symbolic Execution of Distributed Systems}, year = {2013}, school = {RWTH Aachen University}, author = {Sasnaukas, Raimondas} } @Inproceedings { 2012-IPIN-Peter-Versatile-Maps, title = {Versatile Geo-referenced Maps for Indoor Navigation of Pedestrians}, year = {2012}, month = {11}, day = {13}, pages = {1--4}, url = {fileadmin/papers/2012/2012-bitsch-IPIN-vegemite.pdf}, web_url2 = {http://www.surveying.unsw.edu.au/ipin2012/proceedings/session.php?code=6C\&name=SLAM}, misc2 = {Online}, editor = {Li, Binghao Li and Gallagher, Thomas}, publisher = {School of Surveying and Geospatial Engineering, University of New South Wales, Sydney, Australia}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-0-646-57851-4}, reviewed = {1}, author = {Peter, Michael and Fritsch, Dieter and Sch{\"a}fer, Bernhardt and Kleusberg, Alfred and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2012-IPIN-Bitsch-FlowPath, title = {Indoor Navigation on Wheels (and on Foot) using Smartphones}, year = {2012}, month = {11}, day = {13}, pages = {10 S.}, url = {fileadmin/papers/2012/2012-bitsch-IPIN-navigation-on-wheels.pdf}, web_url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6418931}, misc2 = {Print}, address = {Piscataway, NJ, USA}, booktitle = {Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 11-13 November 2012 Sydney, Australia}, organization = {IEEE}, event_place = {Sydney, Australia}, event_name = {2012 International Conference on Indoor Positioning and Indoor Navigation}, event_date = {November 13--15, 2012}, language = {en}, ISBN = {978-1-4673-1955-3}, DOI = {10.1109/IPIN.2012.6418931}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Gerdsmeier, Felix and Smith, Paul and Wehrle, Klaus} } @Article { 2012-stoffers-pik-probabilistic-sync, title = {Behavior-aware Probabilistic Synchronization in Parallel Simulations and the Influence of the Simulation Model}, journal = {Praxis der Informationsverarbeitung und Kommunikation (PIK Journal)}, year = {2012}, month = {11}, volume = {35}, number = {4}, pages = {297--304}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-probabilistic-sync.pdf}, web_url = {http://www.degruyter.com/view/j/piko-2012-35-issue-4/pik-2012-0042/pik-2012-0042.xml?format=INT}, misc2 = {Print}, editor = {Otto Spaniol}, publisher = {De Gruyter}, language = {en}, ISSN = {0930-5157}, DOI = {10.1515/pik-2012-0042}, author = {Stoffers, Mirko} } @Article { 2012-soriadustmann-pik-effizient-sde, title = {Effizientes Auffinden von Fehlern in Verteilten Systemen mit Symbolischer Ausf{\"u}hrung}, journal = {Praxis der Informationsverarbeitung und Kommunikation (PIK Journal)}, year = {2012}, month = {11}, volume = {35}, number = {4}, pages = {289–295}, abstract = {Zum Testen verteilter bzw. vernetzter Systeme existieren zahlreiche Werkzeuge, welche f{\"u}r das Rapid Prototyping und die Fehler-Rekonstruktion unerl{\"a}sslich sind. Durch verschieden stark abstrahierte Modelle lassen sich auf diese Weise, bereits fr{\"u}h in der Entwicklung verteilter Systeme, Aussagen {\"u}ber Performanz, Konsistenz und Korrektheit von Netzwerkprotokollen treffen. Diese Verfahren arbeiten auf explizit f{\"u}r den Testvorgang entworfenen Modellimplementierungen, welche zwar teilweise Quelltext mit der Produktionssoftware gemein haben, aber viele Aspekte und potentielle Fehlerquellen einer tats{\"a}chlichen Software unber{\"u}cksichtigt lassen. In diesem Artikel werden die Grundlagen von Testparadigmen beschrieben, welche die Ausf{\"u}hrung unmodifizierter Software erlauben und dabei erm{\"o}glichen, eine hohe Zuversicht in die getesteten Systeme zu gewinnen. Der Fokus liegt dabei auf der Optimierung von Algorithmen um die redundante Ausf{\"u}hrung des Systems zu minimieren, wodurch sich die zum Testen ben{\"o}tigte Zeit um Gr{\"o}{\ss}enordnungen verringert.}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-soriadustmann-pik-effizient-sde.pdf}, web_url = {http://www.degruyter.com/view/j/piko-2012-35-issue-4/pik-2012-0043/pik-2012-0043.xml?format=INT}, misc2 = {Print}, editor = {Otto Spaniol}, publisher = {De Gruyter}, language = {de}, ISSN = {0930-5157}, DOI = {10.1515/pik-2012-0043}, author = {Soria Dustmann, Oscar} } @Inproceedings { 2012-mass-wirtz-dlsd, title = {DHT-based Localized Service Discovery in Wireless Mesh Networks}, year = {2012}, month = {10}, pages = {10 S.}, url = {fileadmin/papers/2012/2012-mass-wirtz-dlsd.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, booktitle = {Proceedings of The Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), October 8-11 2012, Las Vegas, NV, USA}, event_place = {Las Vegas, USA}, event_name = {Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012)}, event_date = {8-11 October 2012}, language = {en}, ISBN = {978-1-4673-2433-5}, DOI = {10.1109/MASS.2012.6502498}, reviewed = {1}, author = {Wirtz, Hanno and Heer, Tobias and Serror, Martin and Wehrle, Klaus} } @Inproceedings { 2012-wripe-sasnauskas-symnet, title = {Integration Testing of Protocol Implementations using Symbolic Distributed Execution}, year = {2012}, month = {10}, pages = {6 S.}, tags = {kleenet}, url = {fileadmin/papers/2012/2012-09-wripe-sasnauskas-SymNet.pdf}, misc2 = {Print Online}, address = {Piscataway, NJ, USA}, booktitle = {The 2nd International Workshop on Rigorous Protocol Engineering (WRiPE 2012), 30 October - 02 November 2012, Austin, TX, USA}, organization = {IEEE}, event_place = {Austin, TX, USA}, event_name = {The 2nd International Workshop on Rigorous Protocol Engineering (WRiPE 2012)}, event_date = {October 30 - November 02 2012}, language = {en}, ISBN = {978-1-4673-2445-8}, DOI = {10.1109/ICNP.2012.6459940}, reviewed = {1}, author = {Sasnauskas, Raimondas and Kaiser, Philipp and Jukić, Russ Lucas and Wehrle, Klaus} } @Inproceedings { 2012-pimrc-schmidt-ofra, title = {A Receiver-Based 802.11 Rate Adaptation Scheme with On-Demand Feedback}, year = {2012}, month = {9}, day = {10}, pages = {1--7}, abstract = {Classical 802.11 rate adaptation algorithms rely on feedback from the receiver to correctly choose a sending rate, typically in the form of acknowledgments (ACKs). In the absence of such frames, novel techniques are required for rate selection. We present OFRA, a receiver-based rate adaptation algorithm that works with ACK-less traffic. Feedback information is sent on-demand using a control frame to explicitly inform the transmitter about which bit rate to use on subsequent data frames. This approach guarantees standard conformity and exhibits fast and accurate bit rate adaptation at the cost of a modest overhead increase. We evaluate the performance of OFRA against various state-of-the-art rate adaptation schemes by means of simulations. If ACK frames are to be transmitted, OFRA performs better than related work in most considered scenarios, and on par in the others. In the absence of ACKs, OFRA provides large goodput gains under good channel conditions and comparable goodput in other situations.}, tags = {OFRA refector}, url = {fileadmin/papers/2012/2012-schmidt-pimrc-ofra.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12), Sydney, Australia}, event_place = {Sydney, Australia}, event_name = {23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12)}, event_date = {9-12 September 2012}, language = {en}, ISBN = {978-1-4673-2566-0}, ISSN = {2166-9570}, DOI = {10.1109/PIMRC.2012.6362818}, reviewed = {1}, author = {Schmidt, Florian and Hithnawi, Anwar and Pu{\~n}al, Oscar and Gross, James and Wehrle, Klaus} } @Inproceedings { 2012-aktas-new2an-AnAdaptiveCodecSwitchingSchemeforSIPbasedVoIP-conference, title = {An Adaptive Codec Switching Scheme for SIP-based VoIP}, journal = {Proceedings of the 12th International Conference on Next Generation Wired/Wireless Networking (NEW2AN 2012)}, year = {2012}, month = {8}, day = {27}, pages = {1-12}, abstract = {Contemporary Voice-Over-IP (VoIP) systems typically ne- gotiate only one codec for the entire VoIP session life time. However, as different codecs perform differently well under certain network conditions like delay, jitter or packet loss, this can lead to a reduction of quality if those conditions change during the call. This paper makes two core contributions: First, we compare the speech quality of a set of stan- dard VoIP codecs given different network conditions. Second, we propose an adaptive end-to-end based codec switching scheme that fully conforms to the SIP standard. Our evaluation with a real-world prototype based on Linphone shows that our codec switching scheme adapts well to changing network conditions, improving overall speech quality.}, tags = {crawler}, url = {fileadmin/papers/2012/2012-aktas-new2an-codecswitching.pdf}, misc2 = {Online}, publisher = {LNCS}, booktitle = {Proceedings of the 12th International Conference on Next Generation Wired/Wireless Networking (NEW2AN 2012), St. Pettersburg, Russia.}, event_place = {St. Pettersburg, Russia}, event_name = {12th International Conference on Next Generation Wired/Wireless Networking (NEW2AN 2012)}, event_date = {27-29 August, 2012}, language = {en}, ISBN = {978-3-642-32685-1}, DOI = {10.1007/978-3-642-32686-8_32}, reviewed = {1}, author = {Aktas, Ismet and Schmidt, Florian and Weingaertner, Elias and Schnelke, Caj-Julian and Wehrle, Klaus} } @Inproceedings { 2012-stoffers-mascots-ns3-propagation-models, title = {Comparing the ns–3 Propagation Models}, year = {2012}, month = {8}, pages = {61--67}, tags = {nonRWTH}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-ns3-propagation-models.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6298165}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'12), Washington D.C., USA}, event_place = {Washington D.C., USA}, event_name = {20th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)}, language = {en}, ISBN = {978-1-4673-2453-3}, DOI = {10.1109/MASCOTS.2012.17}, reviewed = {1}, author = {Stoffers, Mirko and Riley, George} } @Inproceedings { 2012-kunz-pads-gpu, title = {Multi-level Parallelism for Time- and Cost-efficient Parallel Discrete Event Simulation on GPUs}, year = {2012}, month = {7}, day = {20}, pages = {23--32}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-pads-gpu.pdf}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China}, language = {en}, ISBN = {978-0-7695-4714-5}, ISSN = {1087-4097}, DOI = {10.1109/PADS.2012.27}, reviewed = {1}, author = {Kunz, Georg and Schemmel, Daniel and Gross, James and Wehrle, Klaus} } @Article { 2012-JLBS-Bitsch-FootPath, title = {Accurate Map-based Indoor Navigation on the Mobile}, journal = {Journal of Location Based Services}, year = {2012}, month = {7}, day = {11}, volume = {7}, number = {1}, pages = {23-43}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones, we accurately localise a user on her route and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, web_url = {http://www.tandfonline.com/doi/abs/10.1080/17489725.2012.692620}, misc2 = {Online}, publisher = {Taylor \& Francis}, address = {Bristol, PA, USA}, language = {en}, ISSN = {1748-9733}, DOI = {10.1080/17489725.2012.692620}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Viol, Nicolai and Wehrle, Klaus} } @Inproceedings { 2012-stoffers-pads-hybrid-simulation, title = {Hybrid Simulation of Packet-Level Networks and Functional-Level Routers}, year = {2012}, month = {7}, pages = {111--119}, tags = {nonRWTH}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-stoffers-hybrid-simulation.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6305897}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Zhangjiajie, China}, event_place = {Zhangjiajie, China}, language = {en}, ISBN = {978-0-7695-4714-5}, ISSN = {1087-4097}, DOI = {10.1109/PADS.2012.22}, reviewed = {1}, author = {Stoffers, Mirko and Riley, George} } @Inproceedings { 2012-aktas-wowmom-CRAWLER:AnExperimentationPlatformforSystemMonitoringandCross-Layer-Coordination-conference, title = {CRAWLER: An Experimentation Architecture for System Monitoring and Cross-Layer-Coordination}, journal = {Proceedings of the 13th International Symposium on a World of Wireless, Mobile and MultimediaNetworks (WoWMoM'12), San Francisco, USA}, year = {2012}, month = {6}, day = {25}, pages = {1--9}, tags = {crawler}, url = {fileadmin/papers/2012/2012-aktas-wowmom-crawler.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 13th International Symposium on a World of Wireless, Mobile and MultimediaNetworks (WoWMoM'12), San Francisco, USA}, event_place = {San Francisco}, event_name = {13th International Symposium on a World of Wireless, Mobile and MultimediaNetworks (WoWMoM'12)}, event_date = {25-28 June, 2012}, language = {en}, ISBN = {978-1-4673-1238-7}, DOI = {10.1109/WoWMoM.2012.6263686}, reviewed = {1}, author = {Aktas, Ismet and Schmidt, Florian and Alizai, Muhammad Hamad and Dr{\"u}ner, Tobias and Wehrle, Klaus} } @Inproceedings { 2012-taicpart-dustmann-symbolic-time, title = {Position Paper: Symbolic System Time in Distributed Systems Testing}, year = {2012}, month = {4}, abstract = {We propose an extension of symbolic execution of distributed systems to test software parts related to timing. Currently, the execution model is limited to symbolic input for individual nodes, not capturing the important class of timing errors resulting from varying network conditions. In this paper, we introduce symbolic system time in order to systematically find timing-related bugs in distributed systems. Instead of executing time events at a concrete time, we execute them at a set of times and analyse possible event interleavings on demand. We detail on the resulting problem space, discuss possible algorithmic optimisations, and highlight our future research directions.}, tags = {kleenet}, url = {fileadmin/papers/2012/2012-04-taicpart-soriadustmann-symtime.pdf}, booktitle = {TAICPART'2012}, language = {en}, reviewed = {1}, author = {Soria Dustmann, Oscar and Sasnauskas, Raimondas and Wehrle, Klaus} } @Techreport { 2012-draft-garcia-core-security, title = {Security Considerations in the IP-based Internet of Things}, year = {2012}, month = {3}, day = {26}, number = {draft-garcia-core-security-04}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2012-kunz-simutools-probabilistic-sync, title = {Know Thy Simulation Model: Analyzing Event Interactions for Probabilistic Synchronization in Parallel Simulations}, year = {2012}, month = {3}, day = {20}, pages = {119-128}, tags = {horizon}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2012/2012-kunz-simutools-prob-synch.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques (SIMUTools'12), Desenzano del Garda, Italy}, event_place = {Desenzano, Italy}, language = {en}, ISBN = {978-1-4503-1510-4}, DOI = {10.4108/icst.simutools.2012.247716}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Inproceedings { 2012-aktas-simutools-FANTASY:FullyAutomaticNetworkEmulationArchitecturewithCross-LayerSupport-conference, title = {FANTASY: Fully Automatic Network Emulation Architecture with Cross-Layer Support}, year = {2012}, month = {3}, day = {19}, pages = {57-64}, tags = {crawler, fantasy}, url = {fileadmin/papers/2012/2012-aktas-simutools-fantasy.pdf}, web_url = {http://dl.acm.org/citation.cfm?id=2263019\&CFID=88550183\&CFTOKEN=31687193}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools '12), Desenzano del Garda, Italy}, event_place = {Desenzano, Italy}, event_name = {5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools '12)}, event_date = {19-23 March, 2012}, language = {en}, ISBN = {978-1-4503-1510-4}, DOI = {10.4108/icst.simutools.2012.247759}, reviewed = {1}, author = {Aktas, Ismet and vom Lehn, Hendrik and Habets, Christoph and Schmidt, Florian and Wehrle, Klaus} } @Inproceedings { 2011-12-conext-schmidt-refector, title = {Refector: Heuristic Header Error Recovery for Error-Tolerant Transmissions}, year = {2011}, month = {12}, day = {6}, pages = {1--12}, tags = {refector}, url = {fileadmin/papers/2011/2011-schmidt-refector-conext.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 7th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Tokyo, Japan}, event_place = {Tokyo, Japan}, event_name = {7th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT)}, event_date = {6-9 December, 2011}, language = {en}, ISBN = {978-1-4503-1041-3}, DOI = {10.1145/2079296.2079318}, reviewed = {1}, author = {Schmidt, Florian and Alizai, Muhammad Hamad and Aktas, Ismet and Wehrle, Klaus} } @Inproceedings { 2011-globecom-bitsch-geodtn, title = {geoDTN: Geographic Routing in Disruption Tolerant Networks}, year = {2011}, month = {12}, day = {5}, pages = {1 -- 5}, abstract = {In this paper we present a disruption tolerant routing algorithm based on geographic location information, which improves upon the hop count compared to the current state of the art by up to a factor of three in large scale human networks. Leveraging only the history of geographic movement patterns in the two-hop neighborhood, our algorithm is able to perform well in the absence of knowledge of social interaction between nodes and without detailed future schedule information. Representing previously visited locations as probability distributions encoded in an efficient vector, we formalize a heuristic for efficiently forwarding messages in disruption tolerant networks, implement a framework for comparing our approach with the state of the art, and evaluate key metrics, such as hop count and delivery rate, as well as energy consumption and battery depletion fairness on real world data. We are able to outperform the state of the art in human mobility based networks considerably in terms of energy usage per node, thereby extending data network availability further into areas devoid of otherwise necessary communication infrastructure.}, url = {fileadmin/papers/2011/2011-GlobeCom-bitsch-geoDTN.pdf}, misc2 = {Online}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Houston, Texas, USA}, organization = {IEEE}, event_place = {Houston, Texas, USA}, event_name = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN)}, event_date = {5-9 December 2011}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Schmitz, Daniel and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-03, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {10}, day = {31}, number = {draft-garcia-core-security-03}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-extremecom-bitsch-neighbordiscovery, title = {Perfect Difference Sets for Neighbor Discovery}, year = {2011}, month = {9}, day = {26}, pages = {1--6}, abstract = {We present an energy efficient neighbor discovery framework that enables Linux and TinyOS based systems to discover and connect to neighbors via IEEE 802.11 and IEEE 802.15.4, which are only available sporadically. Using quorum schemes, we schedule on and off times of the wireless transmitters, to guarantee mutual discovery with minimum power given a specific latency requirement. Neighbor discovery is fundamental to intermittently connected networks, such as disruption and delay tolerant networks and optimizing it, can lead to significant overall energy savings. Using perfect difference sets, our results indicate that we reduce the latency by up to 10 times at a duty cycle of 2\% compared to the state of the art. We further define and characterize our neighbor discovery scheme with respect to fairness for asymmetric energy scenarios. Using these results, we allow energy-harvesting applications to adjust neighbor discovery based on their current energy requirements as a well defined trade-off.}, keywords = {Neighbor Discovery; Sporadic Connectivity; Wireless Networks}, url = {fileadmin/papers/2011/2011-ExtremeCom-bitsch-NeighborDiscovery.pdf}, web_url = {http://www.cl.cam.ac.uk/\verb=~=fb375/extremecom/2011/program.html}, web_url2 = {http://dl.acm.org/citation.cfm?id=2414398\&CFID=194814085\&CFTOKEN=73001357}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 3rd Extreme Conference of Communication (ExtremeCom 2011), Manaus, Brazil}, event_place = {Manaus, Brazil}, event_name = {ExtremeCom 2011}, event_date = {26-30 September 2011}, language = {en}, ISBN = {978-1-4503-1079-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Wollgarten, Christoph and Schupp, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath-long, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones}, year = {2011}, month = {9}, day = {21}, pages = {1--8}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-long.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6071934\&tag=1}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-1-4577-1803-8}, DOI = {http://dx.doi.org/10.1109/IPIN.2011.6071934}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Viol, Nicolai and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones (short paper)}, year = {2011}, month = {9}, day = {21}, pages = {1--4}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the de- tected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, note = {short paper (long paper is also available)}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath.pdf}, web_url = {http://ipin2011.dsi.uminho.pt/PDFs/Shortpaper/17_Short_Paper.pdf}, web_url2 = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-slides.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-972-8692-63-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-02, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {7}, day = {11}, number = {draft-garcia-core-security-02}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-02}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-icdcs-sasnauskas-sde, title = {Scalable Symbolic Execution of Distributed Systems}, year = {2011}, month = {6}, pages = {333-342}, abstract = {Recent advances in symbolic execution have proposed a number of promising solutions to automatically achieve high-coverage and explore non-determinism during testing. This attractive testing technique of unmodified software assists developers with concrete inputs and deterministic schedules to analyze erroneous program paths. Being able to handle complex systems' software, these tools only consider single software instances and not their distributed execution which forms the core of distributed systems. The step to symbolic distributed execution is however steep, posing two core challenges: (1) additional state growth and (2) the state intra-dependencies resulting from communication. In this paper, we present SDE—a novel approach enabling scalable symbolic execution of distributed systems. The key contribution of our work is two-fold. First, we generalize the problem space of SDE and develop an algorithm significantly eliminating redundant states during testing. The key idea is to benefit from the nodes' local communication minimizing the number of states representing the distributed execution. Second, we demonstrate the practical applicability of SDE in testing with three sensornet scenarios running Contiki OS.}, tags = {kleenet}, url = {fileadmin/papers/2011/2011-06-icdcs-sasnauskas-sde.pdf}, misc2 = {Druck}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011), June 2011, Minneapolis, MN, USA}, language = {en}, ISBN = {978-0-7695-4364-2}, ISSN = {1063-6927}, DOI = {10.1109/ICDCS.2011.28}, reviewed = {1}, author = {Sasnauskas, Raimondas and Soria Dustmann, Oscar and Kaminski, Benjamin Lucien and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-nsdi-slicetime-weingaertner, title = {SliceTime: A platform for scalable and accurate network emulation}, year = {2011}, month = {3}, day = {30}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-nsdi-slicetime-camera_ready_14P.pdf}, misc2 = {Online}, publisher = {USENIX}, address = {Berkeley, CA, USA}, booktitle = {Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA}, event_place = {Boston, Massachusetts}, language = {en}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and vom Lehn, Hendrik and Heer, Tobias and Wehrle, Klaus} } @Article { 22011-itag-samad-cadplus, title = {CAD+: Detecting Colluding Nodes in Gray Hole Attacks}, journal = {Lecture Notes in Informatics GI-Edition}, year = {2011}, month = {3}, day = {25}, volume = {S-10}, number = {Informatiktage 2011}, pages = {279-282}, misc2 = {Druck}, publisher = {K{\"o}llen Verlag GmbH}, address = {Bonn, Germany}, series = {Gesellschaft f{\"u}r Informatik (GI) S-10}, language = {en}, ISBN = {978-3-88579- 444-8}, ISSN = {1614-3213}, author = {Karuppayah, Shankar and Samad, Fahad} } @Inproceedings { 2011-kunz-omnetpp-horizon, title = {Runtime Efficient Event Scheduling in Multi-threaded Network Simulation}, year = {2011}, month = {3}, day = {21}, pages = {359-366}, abstract = {Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation. We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \textbackslashemph\{push-based event handling scheme\} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \textbackslashemph\{event scheduling algorithm\} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {4th International Workshop on OMNeT++ (OMNeT++'11)}, event_date = {March 21, 2011}, language = {en}, ISBN = {978-1-936968-00-8}, DOI = {10.4108/icst.simutools.2011.245504}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-01, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {14}, number = {draft-garcia-core-security-01}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Techreport { 2011-draft-garcia-core-security-00, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {7}, number = {draft-garcia-core-security-00}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Article { 2011-03-Zimmermann, title = {IP address assignment in wireless mesh networks}, journal = {Wireless Communications and Mobile Computing}, year = {2011}, month = {3}, volume = {11}, number = {3}, pages = {321-337}, misc2 = {Online}, publisher = {John Wiley \& Sons Ltd.}, address = {Hoboken, NJ, USA}, language = {en}, DOI = {10.1002/wcm.982}, reviewed = {1}, author = {Zimmermann, Alexander and Hannemann, Arnd and Schleinzer, Benjamin} } @Inproceedings { 2010-krebs-Globecom10-clustering-mesh-conference, title = {Topology Stability-Based Clustering for Wireless Mesh Networks}, year = {2010}, month = {12}, volume = {1}, pages = {1-5}, abstract = {In the past, many clustering algorithms for ad-hoc networks have been proposed. Their main objective is to solve the scalability issue of ad-hoc networks by grouping nodes into clusters. The challenge in MANETs for those clustering algorithms is to cope with the high node mobility which affects the stability of the cluster structures. Wireless mesh networks consist of a static backbone and a number of mobile nodes. In the backbone of a wireless mesh network the topology is relatively static. However, topology changes occur due to frequent link losses and temporary link instability. Due to the static nature of the backbone, mobility-based approaches are not suitable in this case. In this paper, we state the important aspects for stable clustering in wireless mesh networks with unidirectional links based on the investigation of a 45-node wireless mesh testbed. We analyze well-known clustering algorithms and their performance in a large-scale testbed. Finally, we propose a new clustering algorithm called Stable Link Clustering Algorithm (SLCA).}, url = {fileadmin/papers/2010/2010-lora-clustering-MESH.pdf}, web_url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5683417}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, USA}, event_place = {Miami, FL, USA}, event_name = {IEEE Global Telecommunications Conference, GLOBECOM 2010}, event_date = {6 - 10 December 2010}, language = {en}, ISBN = {978-1-4244-5636-9}, DOI = {10.1109/GLOCOM.2010.5683417}, reviewed = {1}, author = {Krebs, Martin and Stein, Andr{\'e} and Lora Gir{\'o}n, M{\'o}nica Alejandra} } @Inproceedings { 2010-sensys-sasnauskas-coojakleenet, title = {Demo Abstract: Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding}, year = {2010}, month = {11}, pages = {383--384}, abstract = {High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools. We integrate the KleeNet symbolic execution engine with the COOJA network simulator to allow for straight-forward and intuitive high-coverage testing initiated from a simulation environment. A tight coupling of simulation and testing helps detect, narrow down, and fix complex interaction bugs in an early development phase. We demonstrate the seamless transition between COOJA simulation and KleeNet symbolic execution. Our framework enables future research in how high-coverage testing tools could be used in cooperation with simulation tools.}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-osterlind_sasnauskas-sensys-coojakleenet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4503-0344-6}, DOI = {http://doi.acm.org/10.1145/1869983.1870034}, reviewed = {1}, author = {{\"O}sterlind, Fredrik and Sasnauskas, Raimondas and Dunkels, Adam and Soria Dustmann, Oscar and Wehrle, Klaus} } @Inproceedings { schleinzer10, title = {A Security Pattern for Data Integrity in P2P Systems}, year = {2010}, month = {10}, day = {16}, misc2 = {Online}, publisher = {ACM}, booktitle = {PLoP 2010, Reno, NV, USA}, event_place = {Reno}, event_name = {PLoP 2010}, state = {unpublished}, language = {en}, reviewed = {1}, author = {Schleinzer, Benjamin and Yoshioka, Nobukazu} } @Conference { 2010-08-lcn-samad-ASSA, title = {Adaptive Security Established on the Requirements and Resource Abilities of Network Nodes}, year = {2010}, month = {10}, day = {11}, volume = {1}, pages = {752-755}, misc2 = {Online}, publisher = {IEEE}, booktitle = {The 10th IEEE Wireless Local Networks(WLN 2010) in the 35th IEEE Local Computer Networks (LCN 2010), Denver, Colorado, U.S.A.}, event_place = {Denver, Colorado, United States}, event_name = {IEEE Local Computer Networks (IEEE LCN 2010)}, event_date = {11-14 Oct. 2010}, language = {en}, ISBN = {978-1-4244-8388-4}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Inproceedings { 2010softcomweingaertnerprotocolanalysis, title = {Flexible Analysis of Distributed Protocol Implementations using Virtual Time}, year = {2010}, month = {9}, day = {23}, pages = {225 - 229}, note = {available in IEEE Xplore}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-weingaertner-softcom-analysis.pdf}, misc2 = {Online}, publisher = {FESB}, address = {Split, Croatia}, booktitle = {Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010)}, event_place = {Hvar, Croatia}, language = {en}, ISBN = {978-1-4244-8663-2}, reviewed = {1}, author = {Weingaertner, Elias and Ritter, Marko and Sasnauskas, Raimondas and Wehrle, Klaus} } @Conference { 2010-08-icccn-samad-PiCAT, title = {PiCAT: Palliating Channel Assignment Assaults using Adjustable Trust in Wireless Mesh Networks}, journal = {IEEE ICCCN 2010}, year = {2010}, month = {8}, day = {2}, volume = {1}, pages = {1 - 7}, misc2 = {Online}, publisher = {IEEE}, howpublished = {Medienkombination}, booktitle = {The 19th International Conference on Computer Communications and Networks (ICCCN 2010), Zurich, Switzerland}, event_place = {Zurich, Switzerland}, event_name = {19th International Conference on Computer Communications and Networks (ICCCN 2010)}, event_date = {August 2–5, 2010}, language = {en}, ISBN = {978-1-4244-7114-0}, ISSN = {1095-2055}, DOI = {10.1109/ICCCN.2010.5560076}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Inbook { 2010-simtools-sasnauskas-transport, title = {Modeling Transport Layer Protocols}, year = {2010}, month = {6}, pages = {389-399}, misc2 = {Print}, editor = {Klaus Wehrle, Mesut Guenes, James Gross}, publisher = {Springer}, address = {Germany}, chapter = {17}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Sasnauskas, Raimondas and Weingaertner, Elias} } @Inproceedings { icc2010vpsim, title = {Towards Network Centric Development of Embedded Systems}, year = {2010}, month = {5}, day = {23}, pages = {1-6}, abstract = {Nowadays, the development of embedded system hardware and related system software is mostly carried out using virtual platform environments. The high level of modeling detail (hardware elements are partially modeled in a cycle-accurate fashion) is required for many core design tasks. At the same time, the high computational complexity of virtual platforms caused by the detailed level of simulation hinders their application for modeling large networks of embedded systems. In this paper, we propose the integration of virtual platforms with network simulations, combining the accuracy of virtual platforms with the versatility and scalability of network simulation tools. Forming such a hybrid toolchain facilitates the detailed analysis of embedded network systems and related important design aspects, such as resource effectiveness, prior to their actual deployment.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-schuermans-weingaertner-network_centric.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23-27}, language = {en}, ISBN = {978-1-4244-6402-9}, ISSN = {1550-3607}, DOI = {10.1109/ICC.2010.5502185}, reviewed = {1}, author = {Sch{\"u}rmanns, Stefan and Weingaertner, Elias and Kempf, Torsten and Ascheid, Gerd and Wehrle, Klaus and Leupers, Rainer} } @Inproceedings { 2010-ipsn-sasnauskas-kleenet, title = {KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment}, year = {2010}, month = {4}, day = {12}, pages = {186--196}, abstract = {Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.}, keywords = {automated protocol testing, experimentation, failure detection, wireless sensor networks}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791235}, reviewed = {1}, author = {Sasnauskas, Raimondas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 20104-IPSN-alizai-svr, title = {Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks}, year = {2010}, month = {4}, day = {12}, pages = {366-367}, abstract = {We present Statistical Vector Routing (SVR), a protocol that efficiently deals with communication link dynamics in wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.}, tags = {wld}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1791257}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, event_place = {Stockholm, Sweden}, event_name = {9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)}, event_date = {April 12-16, 2010}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and Sasnauskas, Raimondas and Wehrle, Klaus} } @Inproceedings { inproceedingsreference201001221179332027, title = {Towards a Flexible and Versatile Cross-Layer-Coordination Architecture}, year = {2010}, month = {3}, day = {15}, pages = {1-5}, abstract = {In wireless and mobile networking, volatile environ- mental conditions are a permanent challenge, resulting in a demand for cross-layer optimizations. To further increase flexibility, we believe cross-layer architectures should adapt themselves to these changing conditions, just as they adapt the network stack, devices, and applications. In this paper, we propose CRAWLER, a novel cross-layer architecture that combines three core properties: signaling between all layers and system components; extensibility and adaptability at runtime; and high usability for cross-layer developers. CRAWLER increases flexibility, as well as expediting and simplifying cross- layer development.}, note = {Work in Progress session}, tags = {crawler}, url = {fileadmin/papers/2010/2010-03-infocom-aktas-crawler.pdf}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA}, language = {en}, ISBN = {978-1-4244-6739-6}, reviewed = {1}, author = {Aktas, Ismet and Otten, Jens and Schmidt, Florian and Wehrle, Klaus} } @Inproceedings { inproceedingsreference201001227195395138, title = {Iterative Source-Channel Decoding with Cross-Layer Support for Wireless VoIP}, year = {2010}, month = {1}, day = {18}, volume = {1}, pages = {1-6}, abstract = {This paper presents a cross-layer approach for iterative source-channel decoding (ISCD) in wireless VoIP networks. The novelty of the proposed method is the incorporation of both, speech bits as well as protocol header bits, into the ISCD process. The header bits take the role of pilot bits having perfect reliability. These bits are distributed over the frame as strong supporting points for the MAP decoder which results in a significant enhancement of the output speech quality compared to the benchmark scheme using ISCD for speech only. For this approach, we exploit new cross-layer concepts that support the direct communication between non-adjacent layers. These concepts enable the iterative exchange of extrinsic information between the source decoder located on the application layer and the channel decoder located on the physical layer. This technique can also be applied to audio and video transmission.}, tags = {refector}, url = {fileadmin/papers/2010/2010-01-scc-breddermann-iscd.pdf}, misc2 = {CD-ROM / DVD-ROM}, editor = {Rudolf Mathar, Christoph Ruland}, publisher = {VDE Verlag}, address = {Berlin, Germany}, series = {Proceedings of International ITG Conference on Source and Channel Coding}, booktitle = {Proceedings of International ITG Conference on Source and Channel Coding}, organization = {ITG}, event_place = {Siegen}, event_name = {International ITG Conference on Source and Channel Coding 2010}, event_date = {January 18-21, 2010}, language = {en}, ISBN = {978-3-8007-3211-1}, reviewed = {1}, author = {Breddermann, Tobias and Lueders, Helge and Vary, Peter and Aktas, Ismet and Schmidt, Florian} } @Inproceedings { Eisenblaetter10, title = {{A Two-Stage Approach to WLAN Planning: Detailed Performance Evaluation Along the Pareto Frontier}}, year = {2010}, pages = {227 -236}, booktitle = {Proc. of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'10)}, author = {Eisenbl{\"a}tter, Andreas and Geerdes, Hans-Florian and Gross, James and Pu{\~n}al, Oscar and Schweiger, Jonas} } @Conference { 2009-q2swinet-samad-REALISM, title = {REALISM: Rendering Anonymity and Lightweight Security with Mobility in Wireless Ad hoc and Mesh Networks}, journal = {ACM International Symposium on QoS and Security for Wireless and Mobile Networks}, year = {2009}, month = {10}, day = {26}, pages = {97-102}, misc2 = {Online}, publisher = {ACM New York, NY, USA}, booktitle = {The 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, The Canary Islands, Spain}, event_place = {Tenerife, The Canary Islands, Spain}, event_name = {ACM International Symposium on QoS and Security for Wireless and Mobile Networks}, event_date = {26-30 October, 2009}, language = {en}, ISBN = {978-1-60558-619-9}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Conference { 2009-ngmast-samad-pcwmn, title = {Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks}, year = {2009}, month = {9}, day = {15}, volume = {1}, pages = {487-493}, publisher = {IEEE}, howpublished = {Misc}, booktitle = {IEEE NGMAST 2009}, event_place = {Cardiff, U.K.}, event_name = {International Conference and Exhibition on Next Generation Mobil Applications, Services and Technologies}, language = {en}, ISBN = {978-0-7695-3786-3}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Conference { 2009-iscc-samad-NNCQ, title = {Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks}, year = {2009}, month = {7}, day = {5}, pages = {763-769}, misc2 = {Online}, publisher = {IEEE}, booktitle = {IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia}, event_place = {Sousse, Tunisia}, event_name = {IEEE Symposium on Computers and Communications}, language = {en}, ISBN = {978-1-4244-4671-1}, author = {Ali Makram, Sadeq and Samad, Fahad and Guenes, Mesut} } @Conference { 2009-mwns-samad-hsvc, title = {Handling Security Vulnerabilities in Clustered Wireless Mesh Networks}, year = {2009}, month = {5}, day = {15}, pages = {51-62}, misc2 = {Print}, publisher = {Shaker Verlag}, booktitle = {The 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP NETWORKING 2009, Aachen, Germany.}, event_place = {Aachen, Germany}, event_name = {International Workshop on Mobile and Wireless Networks Security (MWNS 2009)}, language = {en}, ISBN = {978-3-8322-8177-9}, author = {Samad, Fahad and Makram, Sadeq Ali} } @Article { inproceedingsreference200903099502213244, title = {Time accurate integration of software prototypes with event-based network simulations}, journal = {Proceedings of the 11th Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance 2009)}, year = {2009}, volume = {37}, number = {2}, pages = {49-50}, note = {Accepted as poster presentation.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-time-accurate-sigmetrics09.pdf}, misc2 = {Print}, publisher = {ACM SIGMETRICS}, address = {New York, NY, USA}, organization = {ACM}, language = {en}, ISSN = {0163-5999}, DOI = {10.1145/1639562.1639580}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and Heer, Tobias and Wehrle, Klaus} } @Conference { 2008-ntms-samad-RFID, title = {Controlling Physical Objects with Privacy using Secure RFID System}, year = {2008}, month = {11}, day = {5}, pages = {1-5}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2nd International Conference on New Technologies, Mobility, and Security (NTMS 2008), Tangier, Morocco}, event_place = {Tangier, Morocco}, event_name = {International Conference on New Technologies, Mobility and Security}, event_date = {5-7 Nov. 2008}, language = {en}, ISBN = {978-2-9532443-0-4}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Inproceedings { 2008-sensys-sasnauskas-kleenet, title = {Poster Abstract: KleeNet - Automatic Bug Hunting in Sensor Network Applications}, year = {2008}, month = {11}, pages = {425--426}, abstract = {We present KleeNet, a Klee based bug hunting tool for sensor network applications before deployment. KleeNet automatically tests code for all possible inputs, ensures memory safety, and integrates well into TinyOS based application development life cycle, making it easy for developers to test their applications.}, keywords = {bug finding, memory safety, tinyos, type safety}, tags = {kleenet}, url = {fileadmin/papers/2008/2008-11-Sasnauskas-SenSys08-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 6th ACM conference on Embedded network sensor systems (SenSys'08), Raleigh, NC, USA}, language = {en}, ISBN = {978-1-59593-990-6}, DOI = {http://doi.acm.org/10.1145/1460412.1460485}, reviewed = {1}, author = {Sasnauskas, Raimondas and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Techreport { 2008-fgsn-sasnauskas-kleenet, title = {Bug Hunting in Sensor Network Applications}, year = {2008}, month = {9}, abstract = {Testing sensor network applications is an essential and a difficult task. Due to their distributed and faulty nature, severe resource constraints, unobservable interactions, and limited human interaction, sensor networks, make monitoring and debugging of applications strenuous and more challenging. In this paper we present KleeNet - a Klee based platform independent bug hunting tool for sensor network applications before deployment - which can automatically test applications for all possible inputs, and hence, ensures memory safety for TinyOS based applications. Upon finding a bug, KleeNet generates a concrete test case with real input values identifying a specific error path in a program. Additionally, we show that KleeNet integrates well into TinyOS application development life cycle with minimum manual effort, making it easy for developers to test their applications.}, tags = {kleenet}, url = {fileadmin/papers/2008/2008-09-Sasnauskas-FGSN08-BugHunting.pdf}, web_url = {ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf}, misc2 = {Print}, publisher = {Freie Universit{\"a}t Berlin, Institute of Computer Science}, address = {Berlin, Germany}, booktitle = {Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany}, institution = {Chair of Communication and Distributed Systems (ComSys)}, language = {en}, reviewed = {1}, author = {Sasnauskas, Raimondas and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Article { 200808WeingaertnerSIGMETRICSPERSyncNetWorkEmulation, title = {Synchronized network emulation: matching prototypes with complex simulations}, journal = {SIGMETRICS Performance Evaluation Review}, year = {2008}, volume = {36}, number = {2}, pages = {58-63}, abstract = {Network emulation, in which real systems interact with a network simulation, is a common evaluation method in computer networking research. Until now, the simulation in charge of representing the network has been required to be real-time capable, as otherwise a time drift between the simulation and the real network devices may occur and corrupt the results. In this paper, we present our work on synchronized network emulation. By adding a central synchronization entity and by virtualizing real systems for means of control, we can build-up network emulations which contain both unmodified x86 systems and network simulations of any complexity.}, note = {This is a revised version of a paper originally presented at the ACM HotMetrics 2008 workshop.}, misc2 = {print}, language = {en}, ISSN = {0163-5999}, DOI = {10.1145/1453175.1453185}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and Heer, Tobias and Wehrle, Klaus} } @Inbook { 2008-thissen-LNCS-multimedia, title = {Multimedia and VR Support for Direct Communication of Designers}, year = {2008}, pages = {268-299}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Sch{\"u}ppen, Andr{\'e} and Spaniol, Otto and Thi{\ss}en, Dirk and Assenmacher, Ingo and Haberstroh, Edmund and Kuhlen, Thorsten} } @Inbook { 2008-thissen-LNCS-management, title = {Service Management for Development Tools}, year = {2008}, pages = {401-429}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Babich, Yuri and Spaniol, Otto and Thi{\ss}en, Dirk} } @Inbook { 2008-thissen-LNCS-synergy, title = {Synergy by Integrating New Functionality}, year = {2008}, pages = {519-526}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Becker, Simon and Heller, Markus and Jarke, Matthias and Marquardt, Wolfgang and Nagl, Manfred and Spaniol, Otto and Thi{\ss}en, Dirk} } @Conference { 2007-aktas-VTC-ApplicabilityofaMulti-ModeMACProtocol-Conference, title = {Applicability of a Multi-Mode MAC Protocol}, year = {2007}, month = {4}, day = {22}, pages = {969 - 973}, booktitle = {Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th}, author = {Otyakmaz, Arif and Aktas, Ismet and Schinnenburg, Marc and Pabst, Ralf} } @Conference { 2007-aktas-WCNC2007-AMulti-ModeMACProtocolwithRelaySupport-Conference, title = {A Multi-Mode MAC Protocol with Relay Support}, year = {2007}, month = {3}, day = {11}, pages = {328 - 333}, abstract = {Future mobile radio networks will have the requirement of very high data rates. Typical wireless data communication will not only occur in short range scenarios like hotspots in airports, city centres, exhibition halls, etc., but also in wide area environments, e.g. a moving car in a rural environment. Data services will require a ubiquitous mobile radio system and demand better quality of service, like high data rates and low delays. Two promising concepts for future mobile radio communication are the deployment of relays and the ability to adapt to various deployment strategies by using different radio access technologies, i.e. modes with a common technology basis. The former concept allows enlarging the cell coverage. Relays are not wired connected and consequently a cost-efficient alternative to base stations that work in a decode-and-forward principle. The latter concept provides modes that are tailored solutions for specific environments and thus allow the adaptation to various scenarios by selecting the most adequate one. The aim of this work is to merge the advantages taken from both concepts to one solution.}, booktitle = {Wireless Communications and Networking Conference, 2007. WCNC 2007}, author = {Otyakmaz, Arif and Aktas, Ismet and Schinnenburg, Marc and Pabst, Ralf} } @Article { 200707ITp2p, title = {Peer-to-Peer Systems (Editorial)}, journal = {Special Issue on Peer-to-Peer of the it - Information Technology Journal}, year = {2007}, volume = {49}, number = {ISSN 0935-3232}, note = {http://it-Information-Technology.de}, author = {Steinmetz, Ralf and Wehrle, Klaus and Liebau, Nicolas} } @Inproceedings { 200706juriFGSN07platform, title = {Simulation von plattformunabh{\"a}ngigen TinyOS-Applikationen mit ns-2}, year = {2007}, address = {Aachen, Germany}, booktitle = {Proceedings of 6th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks''}, author = {Saragazki, Juri and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 200707SchmidtFGSN07composition, title = {Smart Composition of Sensor Network Applications}, year = {2007}, address = {Aachen, Germany}, booktitle = {Proceedings of 6th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Aachen}, author = {Schmitz, Stefan and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 200605NSDIOCALA, title = {OCALA: An Architecture for Supporting Legacy Applications over Overlays}, year = {2006}, abstract = {In order for overlays and new network architectures to gain real user acceptance, users should be able to leverage overlay functionality without any modifications to their applications and operating systems. We present our design, implementation, and experience with OCALA, an overlay convergence architecture that achieves this goal. OCALA interposes an overlay convergence layer below the transport layer. This layer is composed of an overlay independent sub-layer that interfaces with legacy applications, and an overlay dependent sub-layer that delivers packets to the overlay. Unlike previous efforts, OCALA enables: (a) simultaneous access to multiple overlays (b) communication between hosts in different overlays (c) communication between overlay hosts and legacy hosts (d) extensibility, allowing researchers to incorporate their overlays into OCALA. We currently support five overlays, i3 [32], RON [1], HIP [19], DOA [39] and OverDoSe [31] on Linux, Windows XP/2000 and Mac OS X. We (and a few other research groups and end-users) have used OCALA for over a year with many legacy applications ranging from web browsers to remote desktop applications.}, note = {San Jose, California}, publisher = {USENIX / ACM}, booktitle = {Proceedings of 3rd ACM Sigcomm/ACM Sigops Symposium on Networked Systems Design and Implementation (NSDI 2006)}, organization = {ACM}, author = {Joseph, Dilip A and Lakshminarayanan, Karthik and Stoica, Ion and Wehrle, Klaus} } @Techreport { 200605OCALATechReportUCB, title = {OCALA: An Architecture for Supporting Legacy Applications over Overlays}, year = {2005}, number = {UCB/CSD-005/1397}, abstract = {The ever increasing demand of new applications coupled with the increasing rigidity of the Internet has led researchers to propose overlay networks as a means of introducing new functionality in the Internet. However, despite sustained efforts, few overlays are used widely. Providing support for legacy Internet applications to access such overlays would significantly expand the user base of the overlays, as the users can instantly benefit from the overlay functionality. We present the design and implementation of OCALA, an Overlay Convergence Architecture for Legacy Applications. Unlike previous efforts, OCALA allows users to access different overlays simultaneously, as well as hosts in different overlays to communicate with each other. In addition, OCALA reduces the implementation burden on the overlay developers, by factoring out the functions commonly required to support legacy applications, such as tapping legacy traffic, authentication and encryption. Our implementation of OCALA as a proxy requires no changes to the applications or operating systems. We currently support two overlays, i3 and RON, on Linux and Windows XP/2000 platforms. We (and a few other research groups and end-users) have used the proxy over a eleven-month period with many legacy applications ranging from web browsers to remote desktop applications.}, url = {http://ocala.cs.berkeley.edu}, address = {UCB, Berkeley, USA}, institution = {University of California at Berkeley}, author = {Joseph, Dilip and Kannan, Jayanthkumar and Kubota, Ayumu and Stoica, Ion and Wehrle, Klaus} } @Article { 2004steinmetzwehrleP2PNetworking, title = {Peer-to-Peer-Networking \& -Computing}, journal = {Informatik-Spektrum}, year = {2004}, volume = {27}, number = {1}, pages = {51-54}, author = {Steinmetz, Ralf and Wehrle, Klaus} } @Inproceedings { 200410acmmultimediai3composition, title = {Support for Service Composition in i3}, year = {2004}, url = {http://i3.cs.berkeley.edu}, address = {New York, USA}, booktitle = {Proceedings of ACM Multimedia 2004}, organization = {ACM}, author = {Lakshminarayanan, Karthik and Stoica, Ion and Wehrle, Klaus} } @Techreport { 200606i3proxytechreport, title = {Supporting Legacy Applications over i3}, year = {2004}, number = {UCB/CSD-04-1342}, abstract = {Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique which allows the proxy to tunnel the legacy traffic over the overlay transparently. Our solution can preserve IP packet headers on an end-to-end basis, even when end-host IP addresses change, or when endhosts live in different address spaces (e.g., behind NATs). In addition, our solution allows the use of human-readable names to refer to hosts or services, and requires no changes to applications or operating systems. To illustrate how the proxy enables legacy applications to take advantage of the overlay (i.e., i3) functionality, we present four examples: enabling access to machines behind NAT boxes, secure Intranet access, routing legacy traffic through Bro, an intrusion detection system, and anonymous web download. We have implemented the proxy on Linux andWindows XP/2000 platforms, and used it over the i3 service on PlanetLab over a three month period with a variety of legacy applications ranging from web browsers to operating system-specific file sharing.}, url = {http://i3.cs.berkeley.edu}, address = {UCB, Berkeley, USA}, institution = {University of California at Berkeley}, type = {Technical Report}, author = {Kannan, Jayanthkumar and Kubota, Ayumu and Lakshminarayanan, Karthik and Stoica, Ion and Wehrle, Klaus} } @Inbook { 1999-thissen-springer-management, title = {Dienstmanagement und -vermittlung f{\"u}r Entwicklungswerkzeuge}, year = {1999}, pages = {371-386}, misc2 = {Print}, editor = {M. Nagl, B. Westfechtel}, publisher = {Springer}, booktitle = {Integration von Entwicklungssystemen in Ingenieuranwendungen, Substantielle Verbesserung der Entwicklungsprozesse}, language = {de}, ISBN = {3-540-63920-9}, author = {Spaniol, Otto and Thi{\ss}en, Dirk and Meyer, Bernd and Linnhoff-Popien, Claudia} } @Article { 1997-thissen-IM-corba, title = {Industrieller Einsatz von CORBA: Situation und zuk{\"u}nftige Entwicklungen}, journal = {Industrie Management}, year = {1997}, volume = {6}, misc2 = {Print}, language = {de}, author = {Spaniol, Otto and Meyer, Bernd and Thi{\ss}en, Dirk} }