% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-16 % Creation time: 20-36-46 % --- Number of references % 31 % @Inproceedings { 200912BitschSimBetAge, title = {SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks}, year = {2009}, month = {12}, day = {1}, pages = {13--18}, abstract = {In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.}, tags = {RatPack}, url = {fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1659029.1659034\&coll=DL\&dl=GUIDE\&CFID=6806120\&CFTOKEN=29162094}, web_url2 = {http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf}, misc2 = {Online}, editor = {Paulo Mendes, Oliver Marc{\'e}}, publisher = {ACM}, address = {New York City, NY, USA}, series = {U-NET '09}, booktitle = {Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy}, organization = {ACM}, event_place = {Rome, Italy}, event_name = {1st ACM workshop on User-provided networking: challenges and opportunities}, event_date = {1 Dec. 2009}, language = {en}, ISBN = {978-1-60558-750-9}, DOI = {http://doi.acm.org/10.1145/1659029.1659034}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Viol, Nicolai and Goliath, Andr{\'e} and Wehrle, Klaus} } @Inproceedings { 2009-sensys-alizai-burstytraffic, title = {Bursty Traffic over Bursty Links}, year = {2009}, month = {11}, pages = {71-84}, tags = {wld}, url = {fileadmin/papers/2009/2009-alizai-sensys-bre.pdf}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA}, event_place = {Berkley, California}, event_name = {Sensys 09}, event_date = {November 2009}, language = {en}, ISBN = {978-1-60558-519-2}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Conference { 2009-q2swinet-samad-REALISM, title = {REALISM: Rendering Anonymity and Lightweight Security with Mobility in Wireless Ad hoc and Mesh Networks}, journal = {ACM International Symposium on QoS and Security for Wireless and Mobile Networks}, year = {2009}, month = {10}, day = {26}, pages = {97-102}, misc2 = {Online}, publisher = {ACM New York, NY, USA}, booktitle = {The 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, The Canary Islands, Spain}, event_place = {Tenerife, The Canary Islands, Spain}, event_name = {ACM International Symposium on QoS and Security for Wireless and Mobile Networks}, event_date = {26-30 October, 2009}, language = {en}, ISBN = {978-1-60558-619-9}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Techreport { draft-ietf-hip-cert-02, title = {{Host Identity Protocol Certificates}}, year = {2009}, month = {10}, volume = {1}, number = {draft-ietf-hip-cert-02.txt}, note = {{expires: April 29, 2010 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-02}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-02}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Inproceedings { 2009-kunz-mascots-horizon, title = {Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation}, year = {2009}, month = {9}, day = {21}, pages = {575-577}, abstract = {This paper presents Horizon, an extension to network simulation that enables the efficient and detailed simulation of wireless networks. Our contributions are two-fold as Horizon provides i) an API for accurately modeling processing time of discrete event simulation models by augmenting events with time spans and ii) a lightweight parallelization scheme that utilizes timing information to guide the parallel execution of simulations on multi-core computers. In this paper we primarily focus on the latter.}, tags = {horizon}, url = {fileadmin/papers/2009/2009-kunz-mascots-horizon.pdf}, misc = {Poster}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), London, UK}, event_place = {London, Great Britain}, event_name = {17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09)}, event_date = {September 21-32, 2009}, language = {en}, ISBN = {978-1-4244-4926-2}, ISSN = {1526-7539}, DOI = {10.1109/MASCOT.2009.5366710}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Wehrle, Klaus} } @Conference { 2009-ngmast-samad-pcwmn, title = {Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks}, year = {2009}, month = {9}, day = {15}, volume = {1}, pages = {487-493}, publisher = {IEEE}, howpublished = {Misc}, booktitle = {IEEE NGMAST 2009}, event_place = {Cardiff, U.K.}, event_name = {International Conference and Exhibition on Next Generation Mobil Applications, Services and Technologies}, language = {en}, ISBN = {978-0-7695-3786-3}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Techreport { 200908munawarfgsndynamictinyos, title = {Remote Incremental Adaptation of Sensor Network Applications}, year = {2009}, month = {9}, pages = {9-12}, url = {fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf}, web_url = {http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf}, misc2 = {Print}, publisher = {Technical University Hamburg}, address = {Technical University Hamburg}, booktitle = {Proceedings of the 8th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Hamburg, Germany}, institution = {Technical University Hamburg}, language = {en}, author = {Munawar, Waqaas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Techreport { 200908alizaifgsnburstyrouting, title = {Routing Over Bursty Wireless Links}, year = {2009}, month = {9}, pages = {63-66}, abstract = {Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22\% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.}, tags = {wld}, url = {fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf}, web_url = {doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf}, misc2 = {Print}, publisher = {Technical University Hamburg}, address = {Technical University Hamburg}, booktitle = {Proceedings of the 8th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Hamburg, Germany}, language = {en}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { 2009-landsiedel-visa-vipe, title = {A Virtual Platform for Network Experimentation}, year = {2009}, month = {8}, day = {17}, pages = {45--52}, abstract = {Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive. In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.}, keywords = {deployment, network experimentation, resource virtualization, simulation}, url = {fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf}, misc2 = {Print}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures}, event_date = {August 17, 2009}, language = {en}, ISBN = {978-1-60558-595-6}, DOI = {10.1145/1592648.1592657}, reviewed = {1}, author = {Landsiedel, Olaf and Kunz, Georg and G{\"o}tz, Stefan and Wehrle, Klaus} } @Proceedings { 2009-aktas-maple-ModeldrivenSupportforSourceCodeVariabilityinAutomotiveSoftwareEngineering-Workshop, title = {Model-driven Support for Source Code Variability in Automotive Software Engineering}, year = {2009}, month = {8}, pages = {44-51}, abstract = {Variability on source code level in automotive soft- ware engineering is handled by C/C++ preprocessing directives. It provides fine-grained definition of variation points, but brings highly complex structures into the source code. The software gets more difficult to understand, to maintain and to integrate changes. Current approaches for modeling and managing vari- ability on source code do not consider the specific requirements of the automotive domain. To close this gap, we propose a model- driven approach to support software engineers in handling source code variability and configuration of software variants. For this purpose, a variability model is developed that is linked with the source code. Using this approach, a software engineer can shift work steps to the variability model in order to model and manage variation points and implement their variants in the source code.}, keywords = {automotive software engineering; programming; model-driven engineering; variability modeling;}, misc2 = {Online}, publisher = {CEUR}, booktitle = {1st International Workshop on Model-driven Approaches in Software Product Line Engineering (MAPLE), San Francisco, CA, USA}, ISSN = {1613-0073}, reviewed = {1}, author = {Mengi, Cem and Fu{\ss}, Christian and Zimmermann, Ruben and Aktas, Ismet} } @Inproceedings { securityforpervasivemedicalsensornetworks, title = {Security for Pervasive Medical Sensor Networks}, year = {2009}, month = {7}, day = {13}, volume = {1}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-garcia-mobiq.pdf}, misc2 = {Print}, publisher = {IEEE Press}, address = {Washington, DC, USA}, booktitle = {6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto}, organization = {ICST/IEEE}, event_place = {Toronto, CAN}, event_name = {6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)}, language = {en}, ISBN = {978-963-9799-59-2}, DOI = {10.4108/ICST.MOBIQUITOUS2009.6832}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Falck, Thomas and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 200907BitschMOBIQUITOUS09SimBetAge, title = {SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking}, year = {2009}, month = {7}, day = {13}, pages = {1--2}, abstract = {In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs.}, note = {poster and abstract}, tags = {RatPack}, url = {fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363}, misc2 = {Online}, publisher = {IEEE}, address = {New York City, NY, USA}, booktitle = {Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada}, organization = {ICST/IEEE}, event_place = {Toronto, ON, Canada}, event_name = {6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)}, event_date = {July 13-16, 2009}, language = {en}, ISBN = {978-963-9799-59-2}, DOI = {10.4108/ICST.MOBIQUITOUS2009.7017}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Viol, Nicolai and Goliath, Andr{\'e} and Wehrle, Klaus} } @Conference { 2009-iscc-samad-NNCQ, title = {Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks}, year = {2009}, month = {7}, day = {5}, pages = {763-769}, misc2 = {Online}, publisher = {IEEE}, booktitle = {IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia}, event_place = {Sousse, Tunisia}, event_name = {IEEE Symposium on Computers and Communications}, language = {en}, ISBN = {978-1-4244-4671-1}, author = {Ali Makram, Sadeq and Samad, Fahad and Guenes, Mesut} } @Techreport { draft-ietf-hip-cert-01, title = {{Host Identity Protocol Certificates}}, year = {2009}, month = {6}, volume = {1}, number = {draft-ietf-hip-cert-01.txt}, note = {{expires: January 2, 2010 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-01}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-01}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Conference { 2009-mwns-samad-hsvc, title = {Handling Security Vulnerabilities in Clustered Wireless Mesh Networks}, year = {2009}, month = {5}, day = {15}, pages = {51-62}, misc2 = {Print}, publisher = {Shaker Verlag}, booktitle = {The 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP NETWORKING 2009, Aachen, Germany.}, event_place = {Aachen, Germany}, event_name = {International Workshop on Mobile and Wireless Networks Security (MWNS 2009)}, language = {en}, ISBN = {978-3-8322-8177-9}, author = {Samad, Fahad and Makram, Sadeq Ali} } @Poster { 2009-kunz-nsdi-profab, title = {Poster Abstract: Protocol Factory: Reuse for Network Experimentation}, year = {2009}, month = {4}, day = {22}, url = {fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf}, misc = {Poster}, misc2 = {Online}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, booktitle = {6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)}, language = {en}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and G{\"o}tz, Stefan and Wehrle, Klaus} } @Article { 200803WeingaertnerPromox, title = {ProMoX: A protocol stack monitoring framework}, journal = {Electronic Communications of the EASST}, year = {2009}, month = {3}, volume = {17}, number = {2009}, pages = {1-10}, abstract = {In this paper, we present a preliminary glance on our framework for protocol stack monitoring using Xen (ProMoX). ProMoX uses the Xen hypervisor to virtualize entire instances of operating systems which may execute any arbitrary protocol implementation. By utilizing system virtualization for external monitoring, ProMoX can transparently inspect any protocol state and performance metrics of protocol implementations carried by a guest operating system. This way, ProMoX supports both the indentification of faults within early prototypes as well as the evaluation of new protocol designs.}, note = {Accepted for publication}, misc2 = {online}, publisher = {EASST}, address = {Kassel, Germany}, booktitle = {Proceedings of the GI/ITG KIVS Workshop on Overlay and Network Virtualization 2009}, language = {en}, ISSN = {1863-2122}, reviewed = {1}, author = {Weingaertner, Elias and Terwelp, Christoph and Wehrle, Klaus} } @Article { 2009AlizaiPIKtimingenergy, title = {Modelling Execution Time and Energy Consumption in Sensor Node Simulation}, journal = {PIK Journal, Special Issue on Energy Aware Systems}, year = {2009}, month = {2}, volume = {32}, number = {2}, pages = {127-132}, url = {fileadmin/papers/2009/2009-2-alizai-modeling-energy.pdf}, misc2 = {Print}, language = {en}, ISSN = {0930-5157}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus} } @Article { 2009-pik-heer-leicht, title = {Leichtgewichtge Sicherheitsmechanismen f{\"u}r das Host Identity Protocol}, journal = {PIK Journal}, year = {2009}, month = {1}, volume = {32}, number = {1/09}, pages = {48-52}, note = {Diploma Thesis Award Article}, misc2 = {Print}, publisher = {K.G. Saur Verlag}, address = {Munich, Germany}, language = {de}, ISSN = {0930-5157}, author = {Heer, Tobias} } @Inproceedings { DBLP:conf/icaart/ChristophKW09, title = {JamochaAgent - A Rule-based Programmable Agent}, year = {2009}, month = {1}, pages = {447-454}, misc2 = {Print}, editor = {Joaquim Filipe and Ana L. N. Fred and Bernadette Sharp}, publisher = {INSTICC Press}, booktitle = {ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal}, language = {en}, ISBN = {978-989-8111-66-1}, author = {Christoph, Uta and Krempels, Karl-Heinz and Wilden, Alexander} } @Article { Gross09a, title = {{Enhancing IEEE 802.11a/n with Dynamic Single-User OFDM Adaptation}}, journal = {Elsevier Performance Evaluation Journal}, year = {2009}, volume = {66}, number = {3-5}, pages = {240--257}, author = {Gross, James and Emmelmann, Marc and Pu{\~n}al, Oscar and Wolisz, Adam} } @Article { 2009-thissen-JICWI-replication, title = {Improving Quality of Web Services by using Replication}, journal = {IADIS International Journal on WWW/Internet}, year = {2009}, volume = {7}, number = {1}, pages = {26-43}, misc2 = {Online}, publisher = {IADIS Press}, language = {en}, ISSN = {1645-7641}, author = {Thi{\ss}en, Dirk and Brambring, Thomas} } @Article { inproceedingsreference200903099502213244, title = {Time accurate integration of software prototypes with event-based network simulations}, journal = {Proceedings of the 11th Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance 2009)}, year = {2009}, volume = {37}, number = {2}, pages = {49-50}, note = {Accepted as poster presentation.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-time-accurate-sigmetrics09.pdf}, misc2 = {Print}, publisher = {ACM SIGMETRICS}, address = {New York, NY, USA}, organization = {ACM}, language = {en}, ISSN = {0163-5999}, DOI = {10.1145/1639562.1639580}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and Heer, Tobias and Wehrle, Klaus} } @Proceedings { 2009-Weingaertner-ICC-NetworkSimulator-Comparison, title = {A performance comparison of recent network simulators}, year = {2009}, abstract = {A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. While ns-2 has established itself as virtually the standard network simulation tool, other network simulators have gained more and more attention during the last years. In this paper, we briefly survey new developments in the field of network simulation and conduct a performance comparison study by implementing an identical simulation set-up in five simulators, namely ns-2, OMNet++, ns-3, SimPy and JiST/SWANS. Our results reveal large differences according to both run-time performance and memory usage.}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-simulator_comparison.pdf}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009)}, event_place = {Dresden, Germany}, language = {en}, reviewed = {1}, author = {Weingaertner, Elias and vom Lehn, Hendrik and Wehrle, Klaus} } @Inproceedings { Gross09, title = {{Multi-User OFDMA Frame Aggregation for Future Wireless Local Area Networking}}, year = {2009}, pages = {220--233}, booktitle = {Proc. of the 8th International IFIP Networking Conference (NETWORKING'09)}, author = {Gross, James and Pu{\~n}al, Oscar and Emmelmann, Marc} } @Inproceedings { 2009-thissen-GI-IMS, title = {Evaluating the Performance of an IMS/NGN Deployment}, year = {2009}, pages = {2561-2573}, misc2 = {Print}, editor = {S. Fischer, E. Maehle, R. Reischuk}, publisher = {Gesellschaft f{\"u}r Informatik}, series = {Lecture Notes in Informatics 154}, booktitle = {Informatik 2009 - Im Focus das Leben, Beitr{\"a}ge der 39. Jahrestagung der Gesellschaft f{\"u}r Informatik e.V. (GI)}, language = {en}, ISBN = {978-3-88579-248-2}, author = {Thi{\ss}en, Dirk and Espinosa Carl{\'i}n, Juan Miguel and Herpertz, Ren{\'e}} } @Inproceedings { 200906MobiArchgoetzprotocolorchestration, title = {Protocol Orchestration: A Semantic Approach to Communication Stacks}, year = {2009}, pages = {43-50}, abstract = {The diversity of today's networking environments, such as wired, wireless, cell-based, or multi-hop, is matched by an equally large amount and heterogeneity of specialized protocols, e.g., overlays, Wi-Fi positioning, MANET routing, cross-layer signaling. However, communication is typically performed with a static set of protocols selected at design time based on simplified assumptions ignoring the environment's heterogeneity. In this paper, we argue that protocols can be orchestrated as software components driven purely by their functionality and the demands of the execution environment. Our end-system protocol framework Adapt bases on extensible ontological models that semantically describe protocol and environment properties. At runtime, each connection receives a custom-tailored protocol stack that Adapt orchestrates from the requirements derived from the application, user, and environment. With this approach, end-systems can reason about the functionality and quality of automatically composed and adapted protocol compounds while remaining open to existing and future protocols.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-goetz-mobiarch-protocol-orchestration.pdf}, misc2 = {print}, editor = {Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca}, publisher = {ACM}, address = {New York, NY, USA}, howpublished = {print}, booktitle = {Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09)}, organization = {ACM Sigcomm/Sigmobile}, event_place = {Krakow, Poland}, event_name = {Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09), Krakow, Poland}, event_date = {2009-06-22}, language = {en}, reviewed = {1}, author = {G{\"o}tz, Stefan and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 2009morchonpodckeyagreementwsn, title = {Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks}, year = {2009}, volume = {1}, pages = {326-327}, note = {Brief Announcement}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), Calgary}, event_place = {Calgary, CN}, event_name = {28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009)}, language = {en}, ISBN = {978-963-9799-59-2}, DOI = {10.1145/1582716.1582791}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Heer, Tobias and Tolhuizen, Ludo and Wehrle, Klaus} } @Inproceedings { 2009-icc-heer-middleboxes, title = {End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace}, year = {2009}, volume = {1}, pages = {791-796}, abstract = {Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf}, misc2 = {Print}, publisher = {Piscataway, NJ, USA}, address = {Dresden, Germany}, booktitle = {Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany}, organization = {IEEE}, event_place = {Dresden, Germany}, event_name = {IEEE International Conference on Communications 2009 (ICC 2009)}, language = {en}, ISBN = {978-1-4244-3435-0}, ISSN = {1938-1883}, DOI = {10.1109/ICC.2009.5198984}, reviewed = {1}, author = {Heer, Tobias and Hummen, Ren{\'e} and Komu, Miika and G{\"o}tz, Stefan and Wehrle, Klaus} } @Techreport { 2009-heer-draft-midauth, title = {End-Host Authentication for HIP Middleboxes (Version 2)}, year = {2009}, number = {draft-heer-hip-midauth-02}, abstract = {The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias and Komu, Miika and Wehrle, Klaus} } @Techreport { 2009-heer-draft-service-id, title = {Service Identifiers for HIP}, year = {2009}, number = {draft-heer-hip-service-00}, abstract = {The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables HIP end-hosts and HIP-aware middleboxes to announce services to HIP hosts during a HIP Base EXchange (BEX) or HIP update. Service providers are able to specify the type and requirements of a service; clients can then decide to agree on the terms of service. This allows the service provider to verify the accordance of the client with the service conditions while the client is able to verify the authenticity of the used service.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias and Varjonen, Samu and Wirtz, Hanno} }