% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-25 % Creation time: 19-08-11 % --- Number of references % 26 % @Inproceedings { Dombrowski2010GC, title = {Is High Quality Sensing Really Necessary for Opportunistic Spectrum Usage?}, year = {2010}, month = {12}, day = {6}, pages = {1--6}, publisher = {IEEE}, booktitle = {Proc. of IEEE Global Telecommunications Conference (GLOBECOM'10)}, event_place = {Miami, FL, USA}, event_name = {IEEE Global Telecommunications Conference (GLOBECOM'10)}, event_date = {06/12/2010}, author = {Dombrowski, Christian and Willkomm, Daniel and Wolisz, Adam} } @Inproceedings { 2010-sensys-alizai-tinywifi, title = {Poster Abstract: TinyOS Meets Wireless Mesh Networks}, year = {2010}, month = {11}, pages = {429-430}, abstract = {We present TinyWifi, a nesC code base extending TinyOS to support Linux powered network nodes. It enables developers to build arbitrary TinyOS applications and protocols and execute them directly on Linux by compiling for the new TinyWifi platform. Using TinyWifi as a TinyOS platform, we expand the applicability and means of evaluation of wireless protocols originally designed for sensornets towards inherently similar Linux driven ad hoc and mesh networks.}, affiliation = {Received Best Poster Award}, url = {fileadmin/papers/2010/2010-11-alizai-tinywifi-sensys.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1870058\&preflayout=flat}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4503-0344-6}, DOI = {10.1145/1869983.1870058}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kirchen, Bernhard and Bitsch Link, J{\'o} Agila and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 2010-sensys-sasnauskas-coojakleenet, title = {Demo Abstract: Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding}, year = {2010}, month = {11}, pages = {383--384}, abstract = {High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools. We integrate the KleeNet symbolic execution engine with the COOJA network simulator to allow for straight-forward and intuitive high-coverage testing initiated from a simulation environment. A tight coupling of simulation and testing helps detect, narrow down, and fix complex interaction bugs in an early development phase. We demonstrate the seamless transition between COOJA simulation and KleeNet symbolic execution. Our framework enables future research in how high-coverage testing tools could be used in cooperation with simulation tools.}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-osterlind_sasnauskas-sensys-coojakleenet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4503-0344-6}, DOI = {http://doi.acm.org/10.1145/1869983.1870034}, reviewed = {1}, author = {{\"O}sterlind, Fredrik and Sasnauskas, Raimondas and Dunkels, Adam and Soria Dustmann, Oscar and Wehrle, Klaus} } @Proceedings { 2010-wirtz-kuvs-service-overlay, title = {A Generic Service Overlay for Wireless Mesh Networks}, year = {2010}, month = {10}, abstract = {Service discovery in traditional networks is realized either by broadcasting requests in the network or by a central entity that holds the necessary information of every service in the network. These techniques are applicable in wireless networks as well, however, only under certain limiting conditions. The authors present a generic overlay that caters to the special requirements of providing and discovering services in wireless mesh networks. The focus of the approach lies on maintaining scalability in large-scale dynamic networks as well as routing efficiency with regard to the communication characteristics of the underlying network.}, affiliation = {RWTH Aachen University - ComSys}, note = {/fileadmin/papers/2010/2010-wirtz-kuvs-service-overlay.pdf}, publisher = {Gesellschaft f{\"u}r Informatik KuVS}, address = {Berlin, Germany}, booktitle = {3rd GI/ITG KuVS Fachgespr{\"a}ch on NG SDPs, Berlin, Germany}, event_place = {Berlin, Germany}, event_name = {3rd GI/ITG KuVS Fachgespr{\"a}ch on NG SDPs}, event_date = {October 14, 2010}, language = {english}, author = {Wirtz, Hanno and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 2010softcomweingaertnerprotocolanalysis, title = {Flexible Analysis of Distributed Protocol Implementations using Virtual Time}, year = {2010}, month = {9}, day = {23}, pages = {225 - 229}, note = {available in IEEE Xplore}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-weingaertner-softcom-analysis.pdf}, misc2 = {Online}, publisher = {FESB}, address = {Split, Croatia}, booktitle = {Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010)}, event_place = {Hvar, Croatia}, language = {en}, ISBN = {978-1-4244-8663-2}, reviewed = {1}, author = {Weingaertner, Elias and Ritter, Marko and Sasnauskas, Raimondas and Wehrle, Klaus} } @Inproceedings { 2010-kunz-mascots-horizon, title = {Expanding the Event Horizon in Parallelized Network Simulations}, year = {2010}, month = {8}, day = {18}, pages = {172-181}, abstract = {The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.}, tags = {horizon}, url = {fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA}, event_place = {Miami, FL, USA}, event_name = {18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)}, event_date = {August 17-19, 2010}, language = {en}, ISBN = {978-0-7695-4197-6}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2010.26}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Gross, James and G{\"o}tz, Stefan and Naghibi, Farshad and Wehrle, Klaus} } @Inproceedings { 2010-heer-pisa-sa, title = {PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing}, year = {2010}, month = {8}, day = {2}, volume = {1}, pages = {588-593}, abstract = {With the goal of providing ubiquitous wireless services (e.g., tourist guides, environmental information, pedestrian navigation), municipal wireless networks are currently being established all around the world. For municipalities, it is often challenging to achieve the bandwidth and coverage that is necessary for many of the envisioned network services. At the same time, Wi-Fi-sharing communities achieve high bandwidth and good coverage at a very low cost by capitalizing on the dense deployment of private access points in urban areas. However, from a technical, conceptual, and security perspective, Wi-Fi sharing community networks resemble a patchwork of heterogeneous networks instead of one well-planned city-wide network. This patchwork character stands in stark contrast to a uniform, secure platform for public and commercial services desirable for the economic success of such a network. Hence, despite its cost-efficiency, the community-based approach cannot be adopted by municipalities easily. In this paper, we show how to realize municipal wireless services on top of a Wi-Fi-sharing infrastructure in a technically sound and economically attractive fashion. In particular, we focus on how to securely provide services to mobile clients with and without client-side software support. Our solution cleanly separates the roles of controlling and administering the network from providing bandwidth and wireless access. With this separation, commercial ISPs and citizens with their private Wi-Fi can contribute to the network infrastructure. This allows municipalities in turn to focus their resources on municipal wireless services.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-icc-pisa-sa.pdf}, misc2 = {Print}, publisher = {IEEE Press}, address = {Washington, DC, USA}, booktitle = {International Conference on Computer Communication Networks, ICCCN 2010, Zurich}, event_place = {Zurich, Switzerland}, event_name = {International Conference on Computer Communication Networks, ICCCN 2010}, language = {en}, ISBN = {978-1-4244-7114-0}, DOI = {10.1109/ICCCN.2010.5560103}, reviewed = {1}, author = {Heer, Tobias and Jansen, Thomas and Hummen, Ren{\'e} and Wirtz, Hanno and G{\"o}tz, Stefan and Weingaertner, Elias and Wehrle, Klaus} } @Inbook { 2010-simtools-sasnauskas-transport, title = {Modeling Transport Layer Protocols}, year = {2010}, month = {6}, pages = {389-399}, misc2 = {Print}, editor = {Klaus Wehrle, Mesut Guenes, James Gross}, publisher = {Springer}, address = {Germany}, chapter = {17}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Sasnauskas, Raimondas and Weingaertner, Elias} } @Inproceedings { icc2010vpsim, title = {Towards Network Centric Development of Embedded Systems}, year = {2010}, month = {5}, day = {23}, pages = {1-6}, abstract = {Nowadays, the development of embedded system hardware and related system software is mostly carried out using virtual platform environments. The high level of modeling detail (hardware elements are partially modeled in a cycle-accurate fashion) is required for many core design tasks. At the same time, the high computational complexity of virtual platforms caused by the detailed level of simulation hinders their application for modeling large networks of embedded systems. In this paper, we propose the integration of virtual platforms with network simulations, combining the accuracy of virtual platforms with the versatility and scalability of network simulation tools. Forming such a hybrid toolchain facilitates the detailed analysis of embedded network systems and related important design aspects, such as resource effectiveness, prior to their actual deployment.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-schuermans-weingaertner-network_centric.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23-27}, language = {en}, ISBN = {978-1-4244-6402-9}, ISSN = {1550-3607}, DOI = {10.1109/ICC.2010.5502185}, reviewed = {1}, author = {Sch{\"u}rmanns, Stefan and Weingaertner, Elias and Kempf, Torsten and Ascheid, Gerd and Wehrle, Klaus and Leupers, Rainer} } @Inproceedings { 201004vaegsieeestudentpad, title = {Probabilistic Addressing in Wireless Networks}, year = {2010}, month = {5}, day = {20}, pages = {5-8}, abstract = {The lack of permanent network infrastructure and often unplanned deployments in many multihop wireless communication scenarios restrict nodes to determine their own addresses based on the underlying connectivity in the network. However, due to unreliable connectivity and rapidly changing link qualities in wireless networks, establishing uniform addressing and stable point-to-point routing is challenging. In this paper, we present Statistical Vector Routing (SVR), a virtual coordinates based addressing and routing mechanism that efficiently deals with dynamic communication links in wireless networks. It assigns stable probabilistic addresses to nodes without the need to pessimistically estimate links over longer periods of time. The routing metric predicts the current location of a node in its address distribution. Our prototype implementation over real testbeds indicates that SVR, when compared to current approaches, achieves 3 times more stable addressing, reduces the magnitude of change in addresses by 2-10 times, and minimizes the hop distance and transmissions in the network by 10-15\%.}, tags = {wld}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-vaegs-wehrle-probabilistic_addressing.pdf}, misc2 = {Print}, publisher = {Hamburg University of Technology}, address = {Hamburg, Germany}, booktitle = {Proceedings of the 2nd IEEE Student Conference, Hamburg University of Technology, Hamburg, Germany}, event_place = {Hamburg, Germany}, event_name = {2nd IEEE Student Conference, Hamburg University of Technology}, event_date = {May 20-21, 2010}, language = {en}, author = {Vaegs, Tobias and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { 2010-ipsn-sasnauskas-kleenet, title = {KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment}, year = {2010}, month = {4}, day = {12}, pages = {186--196}, abstract = {Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.}, keywords = {automated protocol testing, experimentation, failure detection, wireless sensor networks}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791235}, reviewed = {1}, author = {Sasnauskas, Raimondas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 201004IPSNbitschratmote, title = {Demo Abstract: RatMote - A Sensor Platform for Animal Habitat Monitoring}, year = {2010}, month = {4}, day = {12}, pages = {432--433}, abstract = {In this work, we present RatMote, a new wireless sensor node for subterranean animal habitat monitoring. RatMote has been developed for project RatPack, which aims at creating a new method for behavioral research on rats in their natural environment using wireless sensor nodes. Recent development in microcontroller architecture allowed us to design a sensor node which calculates up to 22 times more operations per mAh than the widely used TelosB node. This significant performance and efficiency increase allows us to perform computationally demanding algorithms inside the node, needed for vocalization analysis, localization, and mapping.}, note = {Demo Abstract}, tags = {RatPack}, url = {fileadmin/papers/2010/2010-04-IPSN-bitsch-ratmote.pdf}, web_url = {http://doi.acm.org/10.1145/1791212.1791291}, misc2 = {Online}, publisher = {ACM}, address = {New York City, NY, USA}, series = {IPSN '10}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, organization = {ACM}, event_place = {Stockholm, Sweden}, event_name = {9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)}, event_date = {April 12-16, 2010}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791291}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Bretgeld, Thomas and Goliath, Andr{\'e} and Wehrle, Klaus} } @Inproceedings { 20104-IPSN-alizai-svr, title = {Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks}, year = {2010}, month = {4}, day = {12}, pages = {366-367}, abstract = {We present Statistical Vector Routing (SVR), a protocol that efficiently deals with communication link dynamics in wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.}, tags = {wld}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1791257}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, event_place = {Stockholm, Sweden}, event_name = {9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)}, event_date = {April 12-16, 2010}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and Sasnauskas, Raimondas and Wehrle, Klaus} } @Inproceedings { 201004vaegsjscsvr, title = {Poster: A Statistical Vector based Routing Protocol for Wireless Networks}, year = {2010}, month = {4}, day = {7}, pages = {279-280}, abstract = {We present Statistical Vector Routing (SVR), a protocol that efficiently deals with the dynamics shown by communication links of wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf}, misc = {Poster}, misc2 = {Print}, editor = {Hans K. Kaiser and Raimund Kirner}, publisher = {Vienna University of Technology}, address = {Karlsplatz 13, 1040 Vienna, Austria}, booktitle = {Proceedings of the Junior Scientist Conference 2010, Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {The Junior Scientist Conference}, event_date = {April 7-9, 2010}, language = {en}, ISBN = {978-3-200-01797-9}, author = {Vaegs, Tobias and Wehrle, Klaus} } @Inproceedings { 2010-percomws-heer-munifi, title = {Collaborative Municipal Wi-Fi Networks - Challenges and Opportunities}, journal = {Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), IEEE.}, year = {2010}, month = {4}, day = {2}, volume = {1}, pages = {588 - 593}, abstract = {Municipal Wi-Fi networks aim at providing Internet access and selected mobile network services to citizens, travelers, and civil servants. The goals of these networks are to bridge the digital divide, stimulate innovation, support economic growth, and increase city operations efficiency. While establishing such urban networks is financially challenging for municipalities, Wi-Fi-sharing communities accomplish good coverage and ubiquitous Internet access by capitalizing on the dense deployment of private access points in urban residential areas. By combining Wi-Fi communities and municipal Wi-Fi, a collaborative municipal Wi-Fi system promises cheap and ubiquitous access to mobile city services. However, the differences in intent, philosophy, and technical realization between community and municipal Wi-Fi networks prevent a straight-forward combination of both approaches. In this paper, we highlight the conceptual and technical challenges that need to be solved to create collaborative municipal Wi-Fi networks.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-percomws-collaborative-municipal-wi-fi.pdf}, misc2 = {Print}, publisher = {IEEE Press}, address = {Washington, DC, USA}, booktitle = {Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany.}, event_place = {Mannheim, Germany}, event_name = {Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010)}, event_date = {April 02, 2010}, language = {en}, ISBN = {978-1-4244-6605-4}, DOI = {10.1109/PERCOMW.2010.5470505}, author = {Heer, Tobias and Hummen, Ren{\'e} and Viol, Nicolai and Wirtz, Hanno and G{\"o}tz, Stefan and Wehrle, Klaus} } @Incollection { 2010-kunz-simtools-deployments, title = {From Simulations to Deployments}, year = {2010}, month = {4}, pages = {83-97}, misc2 = {Print}, editor = {Klaus Wehrle and Mesut G{\"u}nes and James Gross}, publisher = {Springer}, address = {Berlin, Germany}, chapter = {6}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Wittenburg, Georg} } @Inproceedings { 2010-bitsch-link-iq2s-burrowview, title = {BurrowView - Seeing the world through the eyes of rats}, year = {2010}, month = {3}, day = {29}, pages = {56 -- 61}, abstract = {For a long time, life sciences were restricted to look at animal habitats only post-factum. Pervasive computing puts us in the novel position to gain live views. In this paper we present BurrowView, an application that tracks the movement of rats in their natural habitat and reconstructs the underground tunnel system. To make reliable statements, special consideration has been taken with regard to the information quality. Our system is able to reconstruct paths up to a resolution of 20 cm, the length of a rat without its tail.}, tags = {RatPack}, url = {fileadmin/papers/2010/2010-03-IQ2S-link-burrowview.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5470603}, misc2 = {Online}, publisher = {IEEE}, address = {New York City, NY, USA}, booktitle = {Proceedings of the Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010), Mannheim, Germany}, organization = {IEEE}, event_place = {Mannheim, Germany}, event_name = {Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010)}, event_date = {March 29 to April 2, 2010}, language = {en}, ISBN = {978-1-4244-6605-4}, DOI = {10.1109/PERCOMW.2010.5470603}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Fabritius, Gregor and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { inproceedingsreference201001221179332027, title = {Towards a Flexible and Versatile Cross-Layer-Coordination Architecture}, year = {2010}, month = {3}, day = {15}, pages = {1-5}, abstract = {In wireless and mobile networking, volatile environ- mental conditions are a permanent challenge, resulting in a demand for cross-layer optimizations. To further increase flexibility, we believe cross-layer architectures should adapt themselves to these changing conditions, just as they adapt the network stack, devices, and applications. In this paper, we propose CRAWLER, a novel cross-layer architecture that combines three core properties: signaling between all layers and system components; extensibility and adaptability at runtime; and high usability for cross-layer developers. CRAWLER increases flexibility, as well as expediting and simplifying cross- layer development.}, note = {Work in Progress session}, tags = {crawler}, url = {fileadmin/papers/2010/2010-03-infocom-aktas-crawler.pdf}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA}, language = {en}, ISBN = {978-1-4244-6739-6}, reviewed = {1}, author = {Aktas, Ismet and Otten, Jens and Schmidt, Florian and Wehrle, Klaus} } @Inbook { 201001ThieleINTECHRatpack, title = {Dynamic Wireless Sensor Networks for Animal Behavior Research}, year = {2010}, month = {1}, pages = {629--644}, tags = {RatPack}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-01-Thiele-INTECH-Ratpack.pdf}, web_url = {http://sciyo.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research}, web_url2 = {http://www.intechopen.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research}, misc2 = {Online}, editor = {Domenico Campolo}, publisher = {InTech}, address = {Vienna, Austria}, chapter = {32}, booktitle = {Recent Advances in Biomedical Engineering}, language = {en}, ISBN = {978-953-7619-57-2}, reviewed = {1}, author = {Thiele, Johannes and Bitsch Link, J{\'o} Agila and Osechas, Okuary and Mallot, Hanspeter and Wehrle, Klaus} } @Inproceedings { 2010-kai-mccsis.pdf, title = {Standardising the IoT – Collaboration or Competition?}, year = {2010}, pages = {62-66}, url = {https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=\%2Fvar\%2Fwww\%2Ffileadmin\%2Fpapers\%2F2010\%2F\#}, misc2 = {CD}, editor = {Sandeep Krishnamurthy, Gurmit Singh, Maggie McPherson}, publisher = {IADIS, International Association for Development of the Information Society}, booktitle = {Proc. e-Democracy, Equity and Social Justice - EDEM2010, Freiburg, Germany}, language = {en}, ISBN = {978-972-8939-24-3}, reviewed = {1}, author = {Jakobs, Kai and Wagner, Thomas and Reimers, Kai} } @Inproceedings { 2010-kai-erima, title = {Developing Standards for the IoT - A Collaborative Exercise!?}, year = {2010}, volume = {3}, pages = {108-116}, url = {https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=\%2Fvar\%2Fwww\%2Ffileadmin\%2Fpapers\%2F2010\%2F\#}, misc2 = {Online, CD}, editor = {L. Legardeur; K. North}, publisher = {ERIMA}, address = {Bidart, FR}, booktitle = {Towards new challenges for innovative management practices}, language = {en}, ISSN = {2100-0778}, reviewed = {1}, author = {Jakobs, Kai and Wagner, Thomas and Reimers, Kai} } @Inproceedings { 20105munawardynamictinyos, title = {Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks}, year = {2010}, pages = {1-6}, abstract = {Long-term deployments of sensor networks in physically inaccessible environments make remote re-programmability of sensor nodes a necessity. Ranging from full image replacement to virtual machines, a variety of mechanisms exist today to deploy new software or to fix bugs in deployed systems. However, TinyOS - the current state of the art sensor node operating system - is still limited to full image replacement as nodes execute a statically-linked system-image generated at compilation time. In this paper we introduce Dynamic TinyOS to enable the dynamic exchange of software components and thus incrementally update the operating system and its applications. The core idea is to preserve the modularity of TinyOS, i.e. its componentization, which is lost during the normal compilation process, and enable runtime composition of TinyOS components on the sensor node. The proposed solution integrates seamlessly into the system architecture of TinyOS: It does not require any changes to the programming model of TinyOS and existing components can be reused transparently. Our evaluation shows that Dynamic TinyOS incurs a low performance overhead while keeping a smaller - upto one third - memory footprint than other comparable solutions.}, url = {fileadmin/papers/2010/2010-05-icc-munawar-DynamicTinyOS.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa}, language = {en}, ISBN = {978-1-4244-6402-9}, ISSN = {1550-3607}, reviewed = {1}, author = {Munawar, Waqaas and Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 2010-ARCS-alizai-promotingpower, title = {Promoting Power to a First Class Metric in Network Simulations}, year = {2010}, pages = {387-392}, abstract = {Accurate prediction of energy consumption early in the design process is essential to efficiently optimize algorithms and protocols. However, despite energy efficiency gathering significant attention in networking research, limited effort has been invested in providing requisite evaluation tools and models. Hence, developers demand powerful evaluation tools to assist them in comparing new communication paradigms in terms of energy efficiency, and minimizing the energy requirements of algorithms. In this paper, we argue for promoting energy to a first class metric in network simulations. We explore the challenges involved in modelling energy in network simulations and present a detailed analysis of different modelling techniques. Finally, we discuss their applicability in high-level network simulations.}, url = {fileadmin/papers/2010/2010-2-ARCS-alizai-promoting-power.pdf}, misc2 = {Print}, publisher = {VDE-VERLAG}, address = {Berlin, Germany}, booktitle = {Proceedings of the Workshop on Energy Aware Systems and Methods, in conjunction with GI/ITG ARCS 2010 Hannover, Feb. 21-23}, language = {en}, ISBN = {978-3-8007-3222-7}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kunz, Georg and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 201003GarciaEffContAwareAccControlPMS, title = {Efficient and Context-Aware Access Control for Pervasive Medical Sensor Networks}, year = {2010}, booktitle = {Proceedings of the First IEEE PerCom Workshop on Pervasive Healthcare}, author = {Garcia-Morchon, Oscar and Wehrle, Klaus} } @Inproceedings { 201006GarciaIFIPTM, title = {On Applications of Cooperative Security in Distributed Networks}, year = {2010}, abstract = {ManyapplicationsrunningontheInternetoperateinfullyor semi-distributed fashion including P2P networks or social networks. Dis- tributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability. In particular, faulty or mis- behaving nodes cannot collude to subvert the system operation. This paper addresses the above threats by applying cooperative security techniques to relevant distributed systems in the Internet. Our goal is to present methods that allow the peers to bootstrap basic trust relation- ships at the time of joining a distributed network and remove the peers if trust is lost. We consider the specific security caveats of the analyzed sys- tems, investigate the applicability of existing cooperative security-based protocols, and propose general design guidelines for cooperative-security protocol in described distributed systems.}, misc2 = {Print}, publisher = {Springer}, address = {Berlin}, booktitle = {Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management}, event_place = {Morioka, Japan}, event_name = {4th International Conference on Trust Management}, language = {en}, ISBN = {978-3-642-13445-6}, reviewed = {1}, author = {Kuptsov, Dmitriy and Garcia-Morchon, Oscar and Wehrle, Klaus and Gurtov, Andrei} } @Inproceedings { 201006GarciaSacmat, title = {Modular Context-Aware Access Control for Medical Sensor Network}, year = {2010}, abstract = {Medical sensor networks allow for pervasive health monitoring of users in hospitals, at home, or on the way. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that unauthorized parties cannot retrieve confidential information. This is a great challenge due to two main reasons. First, wireless sensors are resource-constrained devices that limit the applicability of traditional solutions. Second, the access control system must be context-aware and adapt its security settings to ensure the users' safety during, e.g., medical emergencies. To solve these issues, this paper presents a modular context-aware access control system tailored to pervasive medical sensor networks in which the access control decisions and the response delay depend upon the health acuteness of a user. Our system extends traditional role-based access control systems by allowing for context-awareness in critical, emergency, and normal access control situations. We further present a lightweight encoding for our modular access control policies as well as an access control engine efficiently running on resource-constrained sensor nodes. Finally, we analyze how the proposed access control system suits existing security architectures for medical sensor networks.}, address = {Pittsburgh, USA}, booktitle = {Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT'10)}, organization = {ACM}, ISBN = {978-1-4503-0049-0}, DOI = {10.1145/1809842.1809864}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Wehrle, Klaus} }