% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-05-03 % Creation time: 22-30-04 % --- Number of references % 43 % @Inproceedings { 2011-wirtz-kaleidoscope, title = {Cooperative Wi-Fi-Sharing: Encouraging Fair Play}, year = {2011}, month = {12}, day = {14}, tags = {mobile_access}, url = {fileadmin/papers/2011/2011-wirtz-kaleidoscope.pdf}, misc = {Online}, address = {ITU}, booktitle = {Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa}, event_place = {Cape Town, South Africa}, event_name = {ITU-T Kaleidoscope: The fully networked human?}, event_date = {2011-12-12}, language = {en}, ISBN = {978-92-61-13651-2}, reviewed = {1}, author = {Wirtz, Hanno and Hummen, Ren{\'e} and Viol, Nicolai and Heer, Tobias and Lora Gir{\'o}n, M{\'o}nica Alejandra and Wehrle, Klaus} } @Inproceedings { 2011-12-conext-schmidt-refector, title = {Refector: Heuristic Header Error Recovery for Error-Tolerant Transmissions}, year = {2011}, month = {12}, day = {6}, pages = {1--12}, tags = {refector}, url = {fileadmin/papers/2011/2011-schmidt-refector-conext.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 7th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Tokyo, Japan}, event_place = {Tokyo, Japan}, event_name = {7th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT)}, event_date = {6-9 December, 2011}, language = {en}, ISBN = {978-1-4503-1041-3}, DOI = {10.1145/2079296.2079318}, reviewed = {1}, author = {Schmidt, Florian and Alizai, Muhammad Hamad and Aktas, Ismet and Wehrle, Klaus} } @Inproceedings { 2011-globecom-bitsch-geodtn, title = {geoDTN: Geographic Routing in Disruption Tolerant Networks}, year = {2011}, month = {12}, day = {5}, pages = {1 -- 5}, abstract = {In this paper we present a disruption tolerant routing algorithm based on geographic location information, which improves upon the hop count compared to the current state of the art by up to a factor of three in large scale human networks. Leveraging only the history of geographic movement patterns in the two-hop neighborhood, our algorithm is able to perform well in the absence of knowledge of social interaction between nodes and without detailed future schedule information. Representing previously visited locations as probability distributions encoded in an efficient vector, we formalize a heuristic for efficiently forwarding messages in disruption tolerant networks, implement a framework for comparing our approach with the state of the art, and evaluate key metrics, such as hop count and delivery rate, as well as energy consumption and battery depletion fairness on real world data. We are able to outperform the state of the art in human mobility based networks considerably in terms of energy usage per node, thereby extending data network availability further into areas devoid of otherwise necessary communication infrastructure.}, url = {fileadmin/papers/2011/2011-GlobeCom-bitsch-geoDTN.pdf}, misc2 = {Online}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Houston, Texas, USA}, organization = {IEEE}, event_place = {Houston, Texas, USA}, event_name = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN)}, event_date = {5-9 December 2011}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Schmitz, Daniel and Wehrle, Klaus} } @Inproceedings { Varj1112:Secure, title = {Secure Resolution of {End-Host} Identifiers for Mobile Clients}, year = {2011}, month = {12}, day = {5}, abstract = {Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT}, keywords = {DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution}, url = {fileadmin/papers/2011/2011-varjonen-secure.pdf}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award}, state = {accepted}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Varjonen, Samu and Heer, Tobias and Rimey, Kenneth and Gurtov, Andrei} } @Techreport { 2011-draft-garcia-core-security-03, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {10}, day = {31}, number = {draft-garcia-core-security-03}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { Dombrowski2011LCN, title = {Hard Real-Time Wireless Medium Access in Action: Stop the Guillotine Within a Millisecond!}, year = {2011}, month = {10}, day = {4}, pages = {1--3}, url = {http://www.ieeelcn.org/prior/LCN36/lcn36demos/lcn-demo2011_dombrowski.pdf}, web_url = {http://www.ieeelcn.org/prior/LCN36/lcn36demos.html}, booktitle = {Proc. of Local Computer Networks Conference, Demonstrations, (LCN'11)}, event_place = {Bonn, Germany}, event_name = {36th IEEE Conference on Local Computer Networks (LCN)}, event_date = {04/10/2011}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Article { 2011-heer-iot-journal, title = {Security Challenges in the IP-based Internet of Things}, journal = {Springer Wireless Personal Communications Journal}, year = {2011}, month = {10}, volume = {61}, number = {3}, pages = {527-542}, abstract = {A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.}, tags = {iotsec}, url = {fileadmin/papers/2011/2011-heer-iot-challenges.pdf}, misc2 = {Online}, publisher = {Springer}, address = {Netherlands}, language = {en}, ISSN = {0929-6212}, DOI = {10.1007/s11277-011-0385-5}, reviewed = {1}, author = {Heer, Tobias and Garcia-Morchon, Oscar and Hummen, Ren{\'e} and Keoh, Sye Loong and Kumar, Sandeep S. and Wehrle, Klaus} } @Inproceedings { 2011-extremecom-bitsch-neighbordiscovery, title = {Perfect Difference Sets for Neighbor Discovery}, year = {2011}, month = {9}, day = {26}, pages = {1--6}, abstract = {We present an energy efficient neighbor discovery framework that enables Linux and TinyOS based systems to discover and connect to neighbors via IEEE 802.11 and IEEE 802.15.4, which are only available sporadically. Using quorum schemes, we schedule on and off times of the wireless transmitters, to guarantee mutual discovery with minimum power given a specific latency requirement. Neighbor discovery is fundamental to intermittently connected networks, such as disruption and delay tolerant networks and optimizing it, can lead to significant overall energy savings. Using perfect difference sets, our results indicate that we reduce the latency by up to 10 times at a duty cycle of 2\% compared to the state of the art. We further define and characterize our neighbor discovery scheme with respect to fairness for asymmetric energy scenarios. Using these results, we allow energy-harvesting applications to adjust neighbor discovery based on their current energy requirements as a well defined trade-off.}, keywords = {Neighbor Discovery; Sporadic Connectivity; Wireless Networks}, url = {fileadmin/papers/2011/2011-ExtremeCom-bitsch-NeighborDiscovery.pdf}, web_url = {http://www.cl.cam.ac.uk/\verb=~=fb375/extremecom/2011/program.html}, web_url2 = {http://dl.acm.org/citation.cfm?id=2414398\&CFID=194814085\&CFTOKEN=73001357}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 3rd Extreme Conference of Communication (ExtremeCom 2011), Manaus, Brazil}, event_place = {Manaus, Brazil}, event_name = {ExtremeCom 2011}, event_date = {26-30 September 2011}, language = {en}, ISBN = {978-1-4503-1079-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Wollgarten, Christoph and Schupp, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-wirtz-chants, title = {Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode}, year = {2011}, month = {9}, day = {23}, url = {fileadmin/papers/2011/2011-wirtz-chants.pdf}, misc = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the ACM MobiCom Workshop on Challenged Networks (Chants 2011), Las Vegas, NV, USA}, event_place = {Las Vegas, NV, USA}, event_name = {ACM MobiCom Workshop on Challenged Networks (Chants 2011)}, event_date = {2011-09-23}, language = {en}, ISBN = {978-1-4503-0870-0}, DOI = {10.1145/2030652.2030666}, reviewed = {1}, author = {Wirtz, Hanno and Heer, Tobias and Backhaus, Robert and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath-long, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones}, year = {2011}, month = {9}, day = {21}, pages = {1--8}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the detected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-long.pdf}, web_url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6071934\&tag=1}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-1-4577-1803-8}, DOI = {http://dx.doi.org/10.1109/IPIN.2011.6071934}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Viol, Nicolai and Wehrle, Klaus} } @Inproceedings { 2011-ipin-bitsch-footpath, title = {FootPath: Accurate Map-based Indoor Navigation Using Smartphones (short paper)}, year = {2011}, month = {9}, day = {21}, pages = {1--4}, abstract = {We present FootPath, a self-contained, map-based indoor navigation system. Using only the accelerometer and the compass readily available in modern smartphones we accurately localize a user on her route, and provide her with turn-by-turn instructions to her destination. To compensate for inaccuracies in step detection and heading estimation, we match the de- tected steps onto the expected route using sequence alignment algorithms from the field of bioinformatics. As our solution integrates well with OpenStreetMap, it allows painless and cost-efficient collaborative deployment, without the need for additional infrastructure.}, note = {short paper (long paper is also available)}, tags = {footpath}, url = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath.pdf}, web_url = {http://ipin2011.dsi.uminho.pt/PDFs/Shortpaper/17_Short_Paper.pdf}, web_url2 = {fileadmin/papers/2011/2011-IPIN-bitsch-footpath-slides.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimaraes, Portugal}, event_place = {Guimar{\~a}es, Portugal}, event_name = {2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, event_date = {21-23 September 2011}, language = {en}, ISBN = {978-972-8692-63-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Smith, Paul and Wehrle, Klaus} } @Inproceedings { 2011-wintech-wirtz, title = {Demo: Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode}, year = {2011}, month = {9}, day = {19}, pages = {89-90}, abstract = {Mobile Ad-Hoc Networks (MANETs) rely on the 802.11 ad- hoc mode to establish communication with nearby peers. In practice, this makes MANETs hard to realize. While 802.11-compliant mobile devices implement the ad-hoc mode on the hardware layer, the software layer typically does not implement support for ad-hoc networking in terms of ad-hoc routing and name resolution protocols. Modern mobile operating systems, such as Android and iOS, even hide the inherent ad-hoc functionality of the wireless card through restrictions in the OS. In contrast to this, support for the 802.11 infrastructure mode is a commodity. We propose establishing ad-hoc networks using the 802.11 infrastructure mode. In MA-Fi (Mobile Ad-Hoc Wi-Fi), a small core of mobile router nodes (RONs) provides infrastruc-ture mode network access to mobile station nodes (STANs). As RONs also act as a station in infrastructure networks of other RONs, MA-Fi achieves multi-hop communication between RON and STAN devices in the overall network. We show the creation and operation of mobile ad-hoc networks using MA-Fi. We focus on mobility of RONs and STANs as well as topology control in the overall network.}, url = {fileadmin/papers/2011/2011-wirtz-wintech.pdf}, misc = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, NV, USA}, event_place = {Las Vegas, Nevada, USA}, event_name = {The Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization}, event_date = {2011-09-19}, language = {en}, ISBN = {978-1-4503-0867-0}, DOI = {10.1145/2030718.2030737}, reviewed = {1}, author = {Wirtz, Hanno and Backhaus, Robert and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { VaegsABW2011, title = {Efficient Power Management Using Out-of-Band Signaling}, year = {2011}, month = {9}, day = {16}, pages = {77-80}, abstract = {A tremendous amount of energy is wasted today, because computing devices are left running all the time even though they are needed only sporadically. Especially in office environments many devices (e.g., printers) are very rarely turned off, because they need to be available from time to time and because it is inconvenient having to switch them on and off manually. Existing solutions, such as Wake-on-LAN (WoL), provide support for managing the power consumption of the network devices remotely using an always-on data channel. However, these solutions are inefficient, because power to the network interface has to be maintained even when the host system is asleep just to ensure remote accessibility. We propose a Wireless Sensor Network (WSN) based out-of-band signaling architecture for network interfaces which minimizes the systems’ power consumption during the large idle periods when nobody is using them. This is done by separating the data and control channels on the Internet-enabled devices using a low-power out-of-band signaling channel based on battery driven, energy scavenging devices. Unlike existing solutions, which only allow parts of the system to go in sleep modes, our architecture allows the whole system, including the main power supply, to be shut down. Our initial investigation indicates a significant reduction in energy consumption of devices during idle times compared to the existing in-band signaling mechanisms such as WoL.}, keywords = {Energy Saving, Wireless Sensor Network, Out-of-Band Signalling}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-vaegs-fgsn-ecocom.pdf}, misc2 = {Online}, booktitle = {Proceedings of the 10th GI/ITG KuVS Fachgespr{\"a}ch Drahtlose Sensornetze (FGSN), Paderborn, Germany}, institution = {RWTH Aachen University}, event_place = {Paderborn, Germany}, event_name = {10th GI/ITG KuVS Fachgespr{\"a}ch Drahtlose Sensornetze (FGSN11)}, event_date = {September 15-16, 2011}, language = {en}, reviewed = {1}, author = {Vaegs, Tobias and Alizai, Muhammad Hamad and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Conference { 2011-lora-QoMEX-Cooperative-QoE-Abstract, title = {QoE in Collaborative Wireless Local Area Networks}, year = {2011}, month = {9}, day = {8}, abstract = {One of the major’s contributions of Collaborative Wi-Fi Networks is to provide a widely distributed Wi-Fi access network in a low cost and ubiquitous way. In order to promote the participation of more actors (both Wi-Fi providers and users) and the success of this kind of emerging solutions is important to satisfy the expectations that the user has regarding the network and the services, increasing the Quality of User Experience (QoE). As one might expect the wireless nature of the Collaborative Wi-Fi Networks imposes a set of challenges those have to be addresses in order to guarantee the QoE that the users are expecting. In this talk, we outline research challenges encountered to improve the overall experience of the user of Collaborative Wi-Fi Networks. Our approach is to study the effect of the user´s perception firstly modifying the way that the user picks the Access Point during the Wireless Association. We highlight how an association based on the selection of the Access Point with the largest RSSI does not guarantee the satisfaction of the expectations of the users. Second, we explain how avoiding duplicate data packets downloaded in the same BSS, improving the throughput of the BSS and the QoE.}, url = {/fileadmin/papers/2011/2011-Lora-QoMex-Abstract.pdf}, misc2 = {Online}, booktitle = {Third International Workshop on Quality of Multimedia Experience - QoMEX 2011, Mechelen, Belgium}, event_place = {Mechelen, Belgium}, event_name = {Third International Workshop on Quality of Multimedia Experience - QoMEX 2011}, event_date = {September 7 - 9, 2011}, type = {Abstract}, language = {en}, ISBN = {978-1-4577-1335-4}, reviewed = {1}, author = {Lora Gir{\'o}n, M{\'o}nica Alejandra} } @Inproceedings { 2011-wintech-alizai-tinywifi, title = {TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers}, year = {2011}, month = {9}, pages = {19-27}, tags = {tinywifi}, url = {fileadmin/papers/2011/2010-09-tinywifi-alizai-wintech.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH ), Las Vegas, NV, USA}, event_place = {Las Vegas, NV, USA}, event_name = {The 17th Annual International Conference on Mobile Computing and Networking}, event_date = {September 2011}, language = {en}, ISBN = {978-1-4503-0867-0}, DOI = {10.1145/2030718.2030725}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kirchen, Bernhard and Vaegs, Tobias and Gnawali, Omprakash and Wehrle, Klaus} } @Inproceedings { 2011-kunz-mascots-performance-prediction, title = {Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations}, year = {2011}, month = {7}, day = {25}, pages = {359 - 368}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-performance-prediction-mascots.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'11), Singapore}, event_place = {Singapore}, event_name = {19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems}, event_date = {July 25-17, 2011}, language = {en}, ISBN = {978-1-4577-0468-0}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2011.15}, reviewed = {1}, author = {Kunz, Georg and Tenbusch, Simon and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-02, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {7}, day = {11}, number = {draft-garcia-core-security-02}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-02}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2011-hummen-pisa-demo, title = {PISA-SA - Security and Mobility in a Collaborative Muni-Fi (Demo Abstract)}, year = {2011}, month = {6}, day = {15}, volume = {15}, pages = {35--36}, tags = {mobile_access}, url = {fileadmin/papers/2011/2011-hummen-wisec-pisa-sa-demo.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany}, event_place = {Hamburg, Germany}, event_name = {Wireless Network Security 2011 (WiSec 2011)}, language = {en}, ISSN = {1559-1662}, DOI = {10.1145/2073290.2073297}, reviewed = {1}, author = {Hummen, Ren{\'e} and Wirtz, Hanno and Viol, Nicolai and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { 2011-icdcs-sasnauskas-sde, title = {Scalable Symbolic Execution of Distributed Systems}, year = {2011}, month = {6}, pages = {333-342}, abstract = {Recent advances in symbolic execution have proposed a number of promising solutions to automatically achieve high-coverage and explore non-determinism during testing. This attractive testing technique of unmodified software assists developers with concrete inputs and deterministic schedules to analyze erroneous program paths. Being able to handle complex systems' software, these tools only consider single software instances and not their distributed execution which forms the core of distributed systems. The step to symbolic distributed execution is however steep, posing two core challenges: (1) additional state growth and (2) the state intra-dependencies resulting from communication. In this paper, we present SDE—a novel approach enabling scalable symbolic execution of distributed systems. The key contribution of our work is two-fold. First, we generalize the problem space of SDE and develop an algorithm significantly eliminating redundant states during testing. The key idea is to benefit from the nodes' local communication minimizing the number of states representing the distributed execution. Second, we demonstrate the practical applicability of SDE in testing with three sensornet scenarios running Contiki OS.}, tags = {kleenet}, url = {fileadmin/papers/2011/2011-06-icdcs-sasnauskas-sde.pdf}, misc2 = {Druck}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011), June 2011, Minneapolis, MN, USA}, language = {en}, ISBN = {978-0-7695-4364-2}, ISSN = {1063-6927}, DOI = {10.1109/ICDCS.2011.28}, reviewed = {1}, author = {Sasnauskas, Raimondas and Soria Dustmann, Oscar and Kaminski, Benjamin Lucien and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 2011-iscc-alizai-ble, title = {Efficient Online Estimation of Bursty Wireless Links}, year = {2011}, month = {6}, url = {fileadmin/papers/2011/2011-alizai-iscc-ble.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {16th IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece}, event_place = {Kerkyra, Greece}, language = {en}, ISBN = {978-1-4577-0678-3}, DOI = {10.1109/ISCC.2011.5983839}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Wirtz, Hanno and Kunz, Georg and Grap, Benjamin and Wehrle, Klaus} } @Techreport { rfc6253, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {5}, number = {rfc6253}, abstract = {The Certificate (CERT) parameter is a container for digital certificates. It is used for carrying these certificates in Host Identity Protocol (HIP) control packets. This document specifies the CERT parameter and the error signaling in case of a failed verification. Additionally, this document specifies the representations of Host Identity Tags in X.509 version 3 (v3) and Simple Public Key Infrastructure (SPKI) certificates. The concrete use of certificates, including how certificates are obtained, requested, and which actions are taken upon successful or failed verification, is specific to the scenario in which the certificates are used. Hence, the definition of these scenario- specific aspects is left to the documents that use the CERT parameter.}, tags = {mobile_access}, url = {http://www.ietf.org/rfc/rfc6253.txt}, publisher = {IETF}, howpublished = {RFC 6253 (Experimental)}, series = {Request for Comments}, organization = {Internet Engineering Task Force}, institution = {Internet Engineering Task Force}, type = {Request For Commments (Experimental Standard)}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Inproceedings { Dombrowski2011RealWIN, title = {Reducing Outage Probability Over Wireless Channels Under Hard Real-time Constraints}, year = {2011}, month = {4}, day = {11}, pages = {1 -6}, booktitle = {Proc. of Workshop on Real-Time Wireless For Industrial Applications (RealWIN'11)}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Inproceedings { 2011-ipsn-alizai-pad, title = {Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks}, year = {2011}, month = {4}, url = {fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA}, event_place = {Chicago, IL, USA}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and G{\"o}tz, Stefan and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2011-nsdi-slicetime-weingaertner, title = {SliceTime: A platform for scalable and accurate network emulation}, year = {2011}, month = {3}, day = {30}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-nsdi-slicetime-camera_ready_14P.pdf}, misc2 = {Online}, publisher = {USENIX}, address = {Berkeley, CA, USA}, booktitle = {Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA}, event_place = {Boston, Massachusetts}, language = {en}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and vom Lehn, Hendrik and Heer, Tobias and Wehrle, Klaus} } @Article { 22011-itag-samad-cadplus, title = {CAD+: Detecting Colluding Nodes in Gray Hole Attacks}, journal = {Lecture Notes in Informatics GI-Edition}, year = {2011}, month = {3}, day = {25}, volume = {S-10}, number = {Informatiktage 2011}, pages = {279-282}, misc2 = {Druck}, publisher = {K{\"o}llen Verlag GmbH}, address = {Bonn, Germany}, series = {Gesellschaft f{\"u}r Informatik (GI) S-10}, language = {en}, ISBN = {978-3-88579- 444-8}, ISSN = {1614-3213}, author = {Karuppayah, Shankar and Samad, Fahad} } @Inproceedings { OttHLVK2011, title = {Floating Content: Information Sharing in Urban Areas}, year = {2011}, month = {3}, day = {21}, abstract = {Content sharing using personal web pages, blogs, or online social networks is a common means for people to maintain contact with their friends, colleagues, and acquaintances. While such means are essential to overcome distances, using infrastructure services for location-based services may not be desirable. In this paper, we analyze a fully distributed variant of an ephemeral content sharing service, solely dependent on the mobile devices in the vicinity using principles of opportunistic networking. The net result is a best effort service for floating content in which: 1) information dissemination is geographically limited; 2) the lifetime and spreading of information depends on interested nodes being available; 3) content can only be created and distributed locally; and 4) content can only be added, but not explicitly deleted. First we present our system design and summarize its analytical modeling. Then we perform extensive evaluation for a map-based mobility model in downtown Helsinki to assess the operational range for floating content, which, at the same time also validate the analytical results obtained for a more abstract model of the system.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-percom-vaegs-floatingcontent.pdf}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, WA, USA}, event_place = {Seattle, USA}, event_name = {9th IEEE International Conference on Pervasive Computing and Communications}, event_date = {March 21 - 25, 2011}, language = {en}, ISBN = {978-1-4244-9529-0}, reviewed = {1}, author = {Ott, J{\"o}rg and Hyyti{\"a}, Esa and Lassila, Pasi and Vaegs, Tobias and Kangasharju, Jussi} } @Inproceedings { 2011-kunz-omnetpp-horizon, title = {Runtime Efficient Event Scheduling in Multi-threaded Network Simulation}, year = {2011}, month = {3}, day = {21}, pages = {359-366}, abstract = {Developing an efficient parallel simulation framework for multiprocessor systems is hard. A primary concern is the considerable amount of parallelization overhead imposed on the event handling routines of the simulation framework. Besides more complex event scheduling algorithms, the main sources of overhead are thread synchronization and locking of shared data structures. As a result, the overhead of parallelization may easily outweigh the benefits of parallelization in comparison to classic sequential simulation. We introduce two efficient event handling schemes based on our parallel-simulation extension Horizon for the OMNeT++ simulator.First, we present a \textbackslashemph\{push-based event handling scheme\} to minimize the overhead of thread synchronization and locking. Second, we complement this scheme with a novel \textbackslashemph\{event scheduling algorithm\} that significantly reduces the overhead of parallel event scheduling. Lastly, we prove the correctness of our scheduling algorithm. Our evaluation reveals a total reduction in the event handling overhead of up to 16x when combining both schemes.}, tags = {horizon}, url = {fileadmin/papers/2011/2011-kunz-horizon-omnetworkshop.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, booktitle = {Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++'11), Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {4th International Workshop on OMNeT++ (OMNeT++'11)}, event_date = {March 21, 2011}, language = {en}, ISBN = {978-1-936968-00-8}, DOI = {10.4108/icst.simutools.2011.245504}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Gross, James and Wehrle, Klaus} } @Techreport { 2011-draft-garcia-core-security-01, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {14}, number = {draft-garcia-core-security-01}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Techreport { 2011-draft-garcia-core-security-00, title = {Security Considerations in the IP-based Internet of Things}, year = {2011}, month = {3}, day = {7}, number = {draft-garcia-core-security-00}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Article { 2011-03-Zimmermann, title = {IP address assignment in wireless mesh networks}, journal = {Wireless Communications and Mobile Computing}, year = {2011}, month = {3}, volume = {11}, number = {3}, pages = {321-337}, misc2 = {Online}, publisher = {John Wiley \& Sons Ltd.}, address = {Hoboken, NJ, USA}, language = {en}, DOI = {10.1002/wcm.982}, reviewed = {1}, author = {Zimmermann, Alexander and Hannemann, Arnd and Schleinzer, Benjamin} } @Inproceedings { 2011-weingaertner-device-driver-enabled, title = {Device-driver enabled Wireless Network Emulation}, year = {2011}, month = {3}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-simutools-wifi-emu_camera-ready.pdf}, misc2 = {Online}, publisher = {ICST}, address = {Brussels, Belgium}, chapter = {Proceedings ot the4th International ICST Conference on Simulation Tools and Techniques (SIMUTools 2011)}, booktitle = {Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques (SIMUTools 2011), Barcelona, Spain}, event_place = {Barcelona, Spain}, state = {accepted}, language = {en}, ISBN = {978-1-936968-00-8}, reviewed = {1}, author = {Weingaertner, Elias and vom Lehn, Hendrik and Wehrle, Klaus} } @Poster { 2011-03-vomLehn-NSDI-PrivacyOnWeb, title = {Work in Progress: Uncovering the Privacy Implications of Web Usage [Poster]}, year = {2011}, month = {3}, note = {poster and abstract}, url = {fileadmin/papers/2011/2011-03-vomLehn-NSDI-PrivacyOnWeb.pdf}, misc2 = {Online}, booktitle = {8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA}, organization = {Usenix}, event_place = {Boston, MA, USA}, event_name = {NSDI}, event_date = {March 30 – April 1, 2011}, state = {accepted}, language = {en}, reviewed = {1}, author = {vom Lehn, Hendrik and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Article { 2011-kai-JITSR, title = {Project Report: Standardising the Internet of Things – What the Experts Think}, journal = {Int. J. on IT Standards \& Standardisation Research}, year = {2011}, month = {1}, volume = {9}, number = {1}, url = {fileadmin/papers/2011/2011-kai-JITSR.pdf}, misc2 = {print}, publisher = {IGI Global}, address = {Hershey, PA, US}, ISSN = {1539-3062}, reviewed = {1}, author = {Jakobs, Kai and Wagner, Thomas and Reimers, Kai} } @Article { 2011-kai-PIK, title = {Koordination und Kooperation in der ICT Standardisierung}, journal = {Praxis der Informations- und Kommunikationstechnik}, year = {2011}, month = {1}, volume = {34}, number = {11}, url = {fileadmin/papers/2011/2011-kai-PiK.pdf}, misc2 = {print}, publisher = {De Gruyter}, address = {Berlin, DE}, author = {Jakobs, Kai} } @Techreport { rfc5201-bis-04, title = {{Host Identity Protocol Version 2}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-rfc5201-bis-04.txt}, note = {{expires: July 24, 2011 (work in progress)}}, tags = {mobile_access}, url = {http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Moskowitz, Robert and Jokela, Petri and Henderson, Thomas R. and Heer, Tobias} } @Techreport { draft-ietf-hip-cert-08, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-cert-08.txt}, note = {{expires: July 22, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-08}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-08}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Techreport { draft-ietf-hip-cert-07, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-cert-07.txt}, note = {{expires: July 16, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-07}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-07}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Techreport { draft-ietf-hip-cert-09, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-cert-09.txt}, pages = {1}, note = {{expires: July 22, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-09}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-09}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Incollection { 2011-kai-springer, title = {How People and Stakeholders Shape Standards – The Case of IEEE 802.11}, year = {2011}, volume = {75}, pages = {1-13}, url = {fileadmin/papers/2011/2011-kai-springer.pdf}, misc2 = {Druck}, editor = {Filipe, Joaquim; Cordeiro, Jos{\'e}}, publisher = {Springer}, address = {Berlin, Germany}, series = {Lecture Notes in Business Information Processing}, edition = {1st}, chapter = {1.1}, booktitle = {Web Information Systems and Technologies}, language = {en}, ISBN = {978-3-642-22809-4}, reviewed = {1}, author = {Jakobs, Kai} } @Inproceedings { PunalScOff11, title = {{Combined Subcarrier Switch Off and Power Loading for 80 MHz Bandwidth WLANs}}, year = {2011}, booktitle = {Proc. of the 18th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN'11)}, author = {Pu{\~n}al, Oscar and Gross, James} } @Inproceedings { Punal11, title = {{Performance Comparison of Loading Algorithms for 80 MHz IEEE 802.11 WLANs}}, year = {2011}, pages = {124--132}, booktitle = {Proc. of the 73rd IEEE Vehicular Technology Conference (VTC-Spring'11)}, author = {Pu{\~n}al, Oscar and Escudero, Humberto and Gross, James} } @Inproceedings { Li2011ICC, title = {{Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access}}, year = {2011}, pages = {1 -6}, booktitle = {Proc. of IEEE International Conference on Communications (ICC'11)}, author = {Li, Di and Gross, James} } @Techreport { 2011-heer-draft-middle-auth, title = {End-Host Authentication for HIP Middleboxes (Version 4)}, year = {2011}, number = {draft-heer-hip-middle-auth-04}, abstract = {The Host Identity Protocol [RFC5201] is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension allows middleboxes to verify the liveness and freshness of a HIP association and, thus, to secure access control in middleboxes.}, note = {Work in progress}, tags = {ietf, mobile_access}, url = {http://tools.ietf.org/html/draft-heer-hip-middle-auth-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Heer, Tobias and Komu, Miika and Hummen, Ren{\'e} and Wehrle, Klaus} }