This file was created by the TYPO3 extension
bib
--- Timezone: UTC
Creation date: 2025-04-19
Creation time: 05-25-11
--- Number of references
13
techreport
2013-schmidt-rtp-extended
Support for Error Tolerance in the Real-Time Transport Protocol
2013
12
20
AIB-2013-19
arXiv:1312.5892 [cs.NI]
1--24
refector
fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf
Online
Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen
Technical Report
en
0935-3232
FlorianSchmidt
DavidOrlea
KlausWehrle
techreport
2013-draft-hummen-dtls-extended-session-resumption-01
Extended DTLS Session Resumption for Constrained Network Environments
2013
10
18
draft-hummen-dtls-extended-session-resumption-01
This draft defines two extensions for the existing session resumption
mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in
constrained network environments. Session resumption type
negotiation enables the client and the server to explicitly agree on
the session resumption mechanism for subsequent handshakes, thus
avoiding unnecessary overheads occurring with the existing
specifications. Session resumption without client-side state
additionally enables a constrained DTLS client to resume a session
without the need to maintain state while the session is inactive.
The extensions defined in this draft update [RFC5077] and [RFC5246].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
JohannesGilger
HosseinShafagh
article
2013-elsevir-aktas-harnessing-cross-layer-design
Harnessing Cross-Layer Design
Elsevir Ad-hoc Networks
2013
10
1
crawler
1
IsmetAktas
Muhammad HamadAlizai
FlorianSchmidt
HannoWirtz
KlausWehrle
article
2013-raza-lithe
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal
2013
10
13
10
3711-3720
Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security
iotsec
en
1530-437X
10.1109/JSEN.2013.2277656
1
ShahidRaza
HosseinShafagh
KasunHewage
RenéHummen
ThiemoVoigt
inproceedings
2013-wintech-schmidt-senserr
Bit Error Distribution and Mutation Patterns of Corrupted Packets in Low-Power Wireless Networks
2013
9
30
49--56
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-schmidt-wintech-errors.pdf
Online
ACM
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA
Miami, USA
8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)
30 September 2013
en
10.1145/2505469.2505475
1
FlorianSchmidt
MatteoCeriotti
KlausWehrle
techreport
2013-draft-garcia-core-security-06
Security Considerations in the IP-based Internet of Things
2013
9
11
draft-garcia-core-security-06
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-06
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
2013-smith-extremecom-demo
Demo: Opportunistic Deployment Support for Wireless Sensor Networks
2013
8
24
1--2
won "coolest demo award"
fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 5th Extreme Conference on Communication
Thorsmork, Iceland
5th Extreme Conference on Communication
August 24-30, 2013
en
978-1-4503-2171-6
1
PaulSmith
Jó AgilaBitsch Link
KlausWehrle
inproceedings
Dombrowski2013WiOpt
Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications
2013
5
13
341-348
energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi
11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013)
Tsukuba Science City, Japan
English
1
ChristianDombrowski
NedaPetreska
SimonGörtzen
AnkeSchmeink
JamesGross
inproceedings
2013-hummen-towards
Towards Viable Certificate-based Authentication for the Web of Things
2013
4
19
iotsec
fileadmin/papers/2013/2013-hummen-towards.pdf
ACM
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Budapest, Hungary
2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy
en
978-1-4503-2003-0
10.1145/2463183.2463193
1
RenéHummen
Jan HenrikZiegeldorf
HosseinShafagh
ShahidRaza
KlausWehrle
inproceedings
2013-hummen-6lowpan
6LoWPAN Fragmentation Attacks and Mitigation Mechanisms
2013
4
17
iotsec; sensorcloud
fileadmin/papers/2013/2013-hummen-6lowpan.pdf
ACM
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Budapest, Hungary
6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
en
978-1-4503-1998-0
10.1145/2462096.2462107
1
RenéHummen
JensHiller
HannoWirtz
MartinHenze
HosseinShafagh
KlausWehrle
inproceedings
2013-schmidt-wons-rtp
A Heuristic Header Error Recovery Scheme for RTP
2013
3
19
186--190
refector
fileadmin/papers/2013/2013-schmidt-wons-rtp-refector.pdf
Online
IEEE
Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13), Banff, Canada
Banff, Canada
10th International Conference on Wireless On-demand Network Systems and Services (WONS'13)
17-20 March 2013
en
978-1-4799-0747-2
10.1109/WONS.2013.6578345
1
FlorianSchmidt
DavidOrlea
KlausWehrle
techreport
2013-draft-garcia-core-security-05
Security Considerations in the IP-based Internet of Things
2013
3
11
draft-garcia-core-security-05
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-05
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
phdthesis
2013-sasnaukas-phdthesis
Symbolic Execution of Distributed Systems
2013
RWTH Aachen University
RaimondasSasnaukas