This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-04-26
Creation time: 07-47-40
--- Number of references
52
techreport
2013-schmidt-rtp-extended
Support for Error Tolerance in the Real-Time Transport Protocol
2013
12
20
AIB-2013-19
arXiv:1312.5892 [cs.NI]
1--24
refector
fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf
Online
Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen
Technical Report
en
0935-3232
FlorianSchmidt
DavidOrlea
KlausWehrle
inproceedings
2013-cloudcom-henze-cloud-data-handling
Towards Data Handling Requirements-aware Cloud Computing (Poster Abstract)
2013
12
2
266-269
ipacs
fileadmin/papers/2013/2013-cloudcom-henze-cloud-data-handling.pdf
Online
IEEE
Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK
Bristol, UK
2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013)
en
978-0-7695-5095-4
10.1109/CloudCom.2013.145
1
MartinHenze
MarcelGroßfengels
MaikKoprowski
KlausWehrle
article
2013-ijghpc-henze-sensorcloud
Maintaining User Control While Storing and Processing Sensor Data in the Cloud
International Journal of Grid and High Performance Computing (IJGHPC)
2013
12
5
4
97-112
sensorcloud
fileadmin/papers/2013/2013-ijghpc-henze-sensorcloud.pdf
Online
IGI Global
en
1938-0259
10.4018/ijghpc.2013100107
1
MartinHenze
RenéHummen
RomanMatzutt
DanielCatrein
KlausWehrle
techreport
2013-draft-hummen-dtls-extended-session-resumption-01
Extended DTLS Session Resumption for Constrained Network Environments
2013
10
18
draft-hummen-dtls-extended-session-resumption-01
This draft defines two extensions for the existing session resumption
mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in
constrained network environments. Session resumption type
negotiation enables the client and the server to explicitly agree on
the session resumption mechanism for subsequent handshakes, thus
avoiding unnecessary overheads occurring with the existing
specifications. Session resumption without client-side state
additionally enables a constrained DTLS client to resume a session
without the need to maintain state while the session is inactive.
The extensions defined in this draft update [RFC5077] and [RFC5246].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
JohannesGilger
HosseinShafagh
inproceedings
2013-hummen-standards
Standards-based End-to-End IP Security for the Internet of Things
2013
10
7
1-3
iotsec
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-standards.pdf
Online
IEEE
21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), Göttingen, Germany
Göttingen, Germany
PhD Forum of 21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum)
7 Oct. 2013
en
978-1-4799-1270-4
10.1109/ICNP.2013.6733648
1
RenéHummen
KlausWehrle
inproceedings
2013-hummen-slimfit
Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things
2013
10
7
259-266
iotsec
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-slimfit.pdf
Online
IEEE
Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on
Lyon, France
IEEE WiMob 2013 Workshop on the Internet of Things Communications and Technologies (IoT 2013)
en
978-1-4577-2014-7
2160-4886
10.1109/WiMOB.2013.6673370
1
RenéHummen
JensHiller
MartinHenze
KlausWehrle
inproceedings
2013-icnp-hummen-tailoring
Tailoring End-to-End IP Security Protocols to the Internet of Things
2013
10
7
1-10
iotsec
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-tailoring.pdf
Online
IEEE
In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany
Göttingen, Germany
21st IEEE International Conference on Network Protocols (ICNP 2013)
7-10 Oct. 2013
en
978-1-4799-1270-4
10.1109/ICNP.2013.6733571
1
RenéHummen
HannoWirtz
Jan HenrikZiegeldorf
JensHiller
KlausWehrle
article
2013-elsevir-aktas-harnessing-cross-layer-design
Harnessing Cross-Layer Design
Elsevir Ad-hoc Networks
2013
10
1
crawler
1
IsmetAktas
Muhammad HamadAlizai
FlorianSchmidt
HannoWirtz
KlausWehrle
article
2013-raza-lithe
Lithe: Lightweight Secure CoAP for the Internet of Things
IEEE Sensors Journal
2013
10
13
10
3711-3720
Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security
iotsec
en
1530-437X
10.1109/JSEN.2013.2277656
1
ShahidRaza
HosseinShafagh
KasunHewage
RenéHummen
ThiemoVoigt
inproceedings
2013-wintech-schmidt-senserr
Bit Error Distribution and Mutation Patterns of Corrupted Packets in Low-Power Wireless Networks
2013
9
30
49--56
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-schmidt-wintech-errors.pdf
Online
ACM
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA
Miami, USA
8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)
30 September 2013
en
10.1145/2505469.2505475
1
FlorianSchmidt
MatteoCeriotti
KlausWehrle
inproceedings
2013-chants-wirtz-heaven
Interest-based Cloud-facilitated Opportunistic Networking
2013
9
30
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf
Online
ACM
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA
Miami, USA
Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013)
30 September 2013
en
978-1-4503-2363-5
10.1145/2505494.2505504
1
HannoWirtz
JanRüth
TorstenZimmermann
KlausWehrle
inproceedings
2013-wintech-bosling-models
Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks
2013
9
30
65--72
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-bosling-wintech-fingerprint.pdf
Online
ACM
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA
Miami, USA
8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)
30 September 2013
en
10.1145/2505469.2505477
1
MarcelBosling
MatteoCeriotti
TorstenZimmermann
Jó AgilaBitsch Link
KlausWehrle
techreport
2013-ceriotti-fgsn-appcentric
Towards Application-Centric Deployment of Low-Power Wireless Networks
2013
9
13
SEEMOO-TR-2013-0
12. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze"
TU Cottbus
Technical Report
MatteoCeriotti
AlexandrKrylovskiy
KlausWehrle
techreport
2013-draft-garcia-core-security-06
Security Considerations in the IP-based Internet of Things
2013
9
11
draft-garcia-core-security-06
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-06
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
conference
VTC2013_parruca_gross
Analytical Model of Proportional Fair Scheduling in Interference-limited OFDMA/LTE Networks
2013
9
Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_VTC_parruca.pdf
Proceedings of IEE Vehicular Telecommunications Conference (VTC-Fall 2013)
Las Vegas, USA
2013 IEEE 78th Vehicular Technology Conference
2-5, September, 2013
DonaldParruca
MariusGrysla
SimonGörtzen
JamesGross
inproceedings
2013-smith-extremecom-demo
Demo: Opportunistic Deployment Support for Wireless Sensor Networks
2013
8
24
1--2
won "coolest demo award"
fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 5th Extreme Conference on Communication
Thorsmork, Iceland
5th Extreme Conference on Communication
August 24-30, 2013
en
978-1-4503-2171-6
1
PaulSmith
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2013-bitsch-extremecom-oneway
A Global One-Way Control Channel for Opportunistic Networks
2013
8
24
1--6
fileadmin/papers/2013/2013-bitsch-extremecom-oneway.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 5th Extreme Conference on Communication
Thorsmork, Iceland
5th Extreme Conference on Communication
August 24-30, 2013
en
978-1-4503-2171-6
1
Jó AgilaBitsch Link
AlaaAlhamoud
KlausWehrle
techreport
draft-hummen-dtls-extended-session-resumption-00
Extended DTLS Session Resumption for Constrained Network Environments
2013
7
15
draft-hummen-dtls-extended-session-resumption-00
This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-00
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
JohannesGilger
inproceedings
2013-wirtz-iot-nc-loops
Opening the Loops - Towards Semantic, Information-centric Networking in the Internet of Things
2013
6
24
/fileadmin/papers/2013/2013-wirtz-control_loops.pdf
IEEE
Proceedings of the IEEE International Workshop on Internet-of-Things Networking and Control
2013 (IoT-NC'13)
New Orleans, USA
IEEE International Workshop on Internet-of-Things Networking and Control 2013 (in conjunction with IEEE SECON'13)
2013-06-24
en
978-1-4673-3122-7
10.1109/SAHCN.2013.6644955
1
HannoWirtz
KlausWehrle
article
2013-scn-ziegeldorf-iot-privacy
Privacy in the Internet of Things: Threats and Challenges
Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World'
2013
6
10
http://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-ziegeldorf-scn-privacy-in-the-iot.pdf
Online
Wiley
en
10.1002/sec.795
1
Jan HenrikZiegeldorf
OscarGarcia-Morchon
KlausWehrle
conference
2013-wowmom-punal-RFRA
RFRA: Random Forests Rate Adaptation for Vehicular Networks
2013
6
4
IEEE
Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)
Madrid, Spain
WoWMoM
June, 2013
accepted
OscarPuñal
HanzhiZhang
JamesGross
inproceedings
2013-sec-routing-switching-maki
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks
2013
6
4
Proceedings of the 4th IEEE International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN 2013)
accepted
1
MarcWerner
JörgKaiser
MatthiasHollick
EliasWeingaertner
KlausWehrle
inproceedings
2013-duma-henze-cloud-annotations
The Cloud Needs Cross-Layer Data Handling Annotations (Position Paper)
2013
5
23
18-22
sensorcloud
fileadmin/papers/2013/2013-duma-henze-cloudannotations.pdf
Online
IEEE
Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA
en
978-1-4799-0458-7
10.1109/SPW.2013.31
1
MartinHenze
RenéHummen
KlausWehrle
inproceedings
Dombrowski2013WiOpt
Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications
2013
5
13
341-348
energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi
11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013)
Tsukuba Science City, Japan
English
1
ChristianDombrowski
NedaPetreska
SimonGörtzen
AnkeSchmeink
JamesGross
inproceedings
2013-hummen-towards
Towards Viable Certificate-based Authentication for the Web of Things
2013
4
19
iotsec
fileadmin/papers/2013/2013-hummen-towards.pdf
ACM
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)
Budapest, Hungary
2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy
en
978-1-4503-2003-0
10.1145/2463183.2463193
1
RenéHummen
Jan HenrikZiegeldorf
HosseinShafagh
ShahidRaza
KlausWehrle
inproceedings
2013-hummen-6lowpan
6LoWPAN Fragmentation Attacks and Mitigation Mechanisms
2013
4
17
iotsec; sensorcloud
fileadmin/papers/2013/2013-hummen-6lowpan.pdf
ACM
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
Budapest, Hungary
6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)
en
978-1-4503-1998-0
10.1145/2462096.2462107
1
RenéHummen
JensHiller
HannoWirtz
MartinHenze
HosseinShafagh
KlausWehrle
inproceedings
2013-EW-Weyres-Interference
Effective Service Capacity Analysis of Interference-Limited Multi-Carrier Wireless Systems
19th European Wireless Conference
2013
4
1--7
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6582799
VDE-Verlag
19th European Wireless Conference (EW 2013)
978-3-8007-3498-6
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6582799
1
MarcoWeyres
JamesGross
inproceedings
2013-wisec-garcia-securing
Securing the IP-based Internet of Things with HIP and DTLS
2013
4
119--124
ACM
Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)
978-1-4503-1998-0
10.1145/2462096.2462117
1
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
PedroMoreno-Sanchez
FranciscoVidal-Meca
Jan HenrikZiegeldorf
inproceedings
2013-pitsac-vidalmeca-hip
HIP security architecture for the IP-based Internet of Things
2013
3
25
1331 - 1336
The IP-based Internet of Things refers to the
pervasive interactions of smart objects and people enabling
new applications by means of IP protocols. An application
scenario is a Smart City in which the city infrastructure,
cars, and people exchange information to enable new services.
IP protocols, such as IPv6, TCP and HTTP will be further
complemented by IPv6 over Low powerWireless Personal Area
Networks and Constrained Application Protocol currently in
development in IETF. Security and privacy are a must for
the IP-based IoTs in order to ensure its acceptance. However,
mobility, limited bandwidth, and resource-constrained devices
pose new challenges and require for a sound and efficient
security architecture. In particular, dynamic association of
mobile smart objects and the management of keys in large-scale
networks remain an open challenge. In this context, we propose
a flexible security architecture based on the Host Identity
Protocol and Multimedia Internet KEYing protocols allowing
for secure network association and key management. HIP -
based on asymmetric-key cryptography - ensures unambiguous
thing identification, mobility support, as well as a lightweight
and secure method for network association. In our solution,
HIP is extended with MIKEY capabilities to provide enhanced
key management using polynomials, which allow to generate
pairwise keys with any node based on its identity. This
combination of protocols and crypto-algorithms ensures both
strong security and very good performance as shown by our
implementation and presents clear advantages compared with
other alternatives.
Internet of Things; Security; Network Access; Key Management
Online
IEEE
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013
Barcelona, Spain
25.-28.03.2013
en
10.1109/WAINA.2013.158
1
FranciscoVidal Meca
Jan HenrikZiegeldorf
OscarGarcia-Morchon
Sandeep S.Kumar
Sye LoongKeoh
PedroMoreno-Sanchez
inproceedings
2013-schmidt-wons-rtp
A Heuristic Header Error Recovery Scheme for RTP
2013
3
19
186--190
refector
fileadmin/papers/2013/2013-schmidt-wons-rtp-refector.pdf
Online
IEEE
Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13), Banff, Canada
Banff, Canada
10th International Conference on Wireless On-demand Network Systems and Services (WONS'13)
17-20 March 2013
en
978-1-4799-0747-2
10.1109/WONS.2013.6578345
1
FlorianSchmidt
DavidOrlea
KlausWehrle
article
2013-fernandez-ceriotti-bitsch-and-then-the-weekend-jsan
“And Then, the Weekend Started”: Story of a WSN Deployment on a Construction Site
Journal of Sensor and Actuator Networks
2013
3
11
2
1
156--171
Wireless Sensor Networks (WSNs) are versatile monitoring systems that can provide a large amount of real-time data in scenarios where wired infrastructures are inapplicable or expensive. This technology is expected to be handled by domain experts, who perceive a WSN as a (promised to be) easy to deploy black box. This work presents the deployment experience of a WSN, as conducted by domain experts, in a ground improvement area. Building upon off-the-shelf solutions, a fuel cell powered gateway and 21 sensor devices measuring acceleration, inclination, temperature and barometric pressure were installed to monitor ground subsidence. We report about how poor GSM service, malfunctioning hardware, unknown communication patterns and obscure proprietary software required in-field ad-hoc solutions. Through the lessons learned, we look forward to investigating how to make the deployment of these systems an easier task.
sensor network deployment; experiences; in-field debugging
http://www.mdpi.com/2224-2708/2/1/156
Online
en
2224-2708
10.3390/jsan2010156
1
TomásFernández-Steeger
MatteoCeriotti
Jó AgilaBitsch Link
MatthiasMay
KlausHentschel
KlausWehrle
techreport
2013-draft-garcia-core-security-05
Security Considerations in the IP-based Internet of Things
2013
3
11
draft-garcia-core-security-05
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-05
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
inproceedings
2013-wons-wirtz-fuzzy
Fuzzy Logical Coordinates and Location Services for Scalable Addressing in Wireless Networks
2013
3
Online
IEEE
Proceedings of the 10th International Conference on
Wireless On-demand Network Systems and Services (WONS '13), Banff, Canada
Banff, Canada
en
978-1-4799-0747-2
10.1109/WONS.2013.6578338
1
HannoWirtz
Muhammad HamadAlizai
KlausWehrle
proceedings
parruca_gross_2013
Rate selection analysis under semi-persistent scheduling in LTE networks
2013
1
25
1184,1190
Upcoming LTE networks have basically two different modes for scheduling data in the down-link by the base station. Dynamic scheduling brings the advantage of exploiting instantaneous channel state information while it puts on the other hand a significant burden on the system in terms of overhead and computation requirements. Especially for small packets that show up periodically, the overhead is typically too high. Therefore, the base station can serve such packet flows by the semi-persistent scheduling mode. In this mode, a certain resource allocation is fixed to a periodic schedule. While this does not allow any longer to exploit instantaneous channel states, it requires much less overhead. In this paper, we address the problem of selecting a modulation and coding scheme for such semi-persistent scheduling grants. The problem lies here in the stochastic characterization of the resource blocks over the next few seconds while on the other hand estimating based on such a characterization the blok error rate (and hence the average goodput). We provide a novel scheme, which outperforms all previously presented schemes significantly. The underlying model that we provide can also be used for any other long-term decision in an LTE system with semi-persistent scheduling such as interference coordination, handover decision etc.
Long Term Evolution;decision making;dynamic scheduling;error statistics;modulation;radio links;resource allocation;stochastic processes;wireless channels;LTE networks;base station;blok error rate;data scheduling;down-link;dynamic scheduling;instantaneous channel state information;long-term decision;modulation selection;packet flows;periodic scheduling;rate selection analysis;resource allocation;resource blocks;semi-persistent scheduling mode;stochastic characterization
www.performance.rwth-aachen.de/publications/conferences/2013ICNC_parruca.pdf
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6504261
San Diego, USA
International Conference on Computing, Networking and Communications (ICNC) 2013
28-31 January 2013
English
978-1-4673-5287-1
10.1109/ICCNC.2013.6504261
DonaldParruca
JamesGross
inproceedings
2013-ccnc-lora-gossipmule
Gossipmule: Improving Association Decisions via Opportunistic Recommendations
2013
1
11
Proceedings of the 1st Workshop on People Centric Sensing and Communications
accepted
1
Mónica AlejandraLora Girón
AlexanderPaulus
KlausWehrle
techreport
2013-draft-hummen-hip-middle-puzzle-01
HIP Middlebox Puzzle Offloading and End-host Notification
2013
1
9
draft-hummen-hip-middle-puzzle-01
The Host Identity Protocol [RFC5201] is a secure signaling protocol with a cryptographic namespace. It provides the communicating peers with a cryptographic puzzle mechanism to protect against Denial of Service (DoS) attacks exploiting the computation and memory overheads of the protocol exchange. This document specifies an extension of the protocol that enables an on-path network entity to assist in the choice of the puzzle difficulty in case of an attack. Furthermore, it defines a modification of the puzzle mechanism that enables a host to delegate puzzle solving to an on-path network entity.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-hip-middle-puzzle-01
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
MartinHenze
JensHiller
inproceedings
2013-ccncdemo-lora-gossipmule
Demo: Improving Associations in IEEE 802.11 WLANs
2013
1
Proceedings of the 10th IEEE Consumer Communications & Networking Conference, CCNC
Las Vegas, Nevada, USA
CCNC 2013 Demonstration Track
accepted
Mónica AlejandraLora Girón
AlexanderPaulus
KlausWehrle
article
2013-pik-hiller-e2e-security-smart
End-to-End Security for Internet-Connected Smart Objects
Praxis der Informationsverarbeitung und Kommunikation
2013
36
1
23-29
en
1865-8342
10.1515/pik-2012-0141
JensHiller
article
2013-JIT-Jakobs
Why Then Did the X.400 E-mail Standard Fail? Reasons and Lessons to be Learned.
Journal of Information Technology
2013
28
2
fileadmin/papers/2013/2013-JIT-Jakobs.pdf
KaiJakobs
article
2013-wirtz-alizai-tinywifi-jnca
Portable Wireless-Networking Protocol Evaluation
Journal of Network and Computer Applications (JNCA)
2013
Co-primary authorship Alizai, Wirtz
fileadmin/papers/2013/2013-wirtz-alizai-tinywifi-jnca.pdf
http://www.sciencedirect.com/science/article/pii/S108480451300060X
en
1084-8045
10.1016/j.jnca.2013.02.022
1
HannoWirtz
Muhammad HamadAlizai
BernhardKirchen
KlausWehrle
book
2013-Jakobs-SIIT
Proceedings 8th IEEE Conf. on Standardisation & Innovation in Information Technology
2013
Kai Jakobs
IEEE
1
KaiJakobs
book
2013_Jakobs_EURAS
Boosting European Competitiveness. Proceedings of the 18th EURAS Conference. EURAS contributions to standardisation research, vol. 7.
2013
Kai Jakobs et al.
Mainz Academic Publishers
KaiJakobs
inbook
2013-book-weingaertner-benchmarking-p2p
Benchmarking Peer-to-Peer Systems
Understanding Quality of Service in Large-Scale Distributed Systems
2013
7847
69-79
http://link.springer.com/chapter/10.1007/978-3-642-38673-2_5
2016-11-11
Print
Effelsberg, Wolfgang and Steinmetz, Ralf and Strufe, Thorsten
Springer
Lecture Notes in Computer Science
Content Delivery Overlays
EN
978-3-642-38672-5
10.1007/978-3-642-38673-2_5
EliasWeingaertner
RenéGlebke
AlexanderHocks
conference
EW2013_parruca_gross
On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems
2013
8
In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models.
ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX
https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf
http://www.vde-verlag.de/proceedings-en/563498043.html
vde-verlag
vde-verlag
http://www.vde-verlag.de/
Proceedings: European Wireless 2013
Guildford, UK
2013 - 19th European Wireless Conference
04/16/2012 - 04/18/2013
English
DonaldParruca
MariusGrysla
PetriMähönen
MarinaPetrova
HanZhou
FarshadNaghibi
JamesGross
inproceedings
Mobileoffloading_2013
Mobile Adhoc Offloading in Wireless Ad hoc Network
2013
http://arxiv.org/abs/1401.4528
Proc. of MANIAC 2013: Mobile Offloading competition
MANIAC 2013
Berlin, Germany
DiLi
AsyaMitseva
inproceedings
2013_Jakobs_SIIT1
How to Perceive the (Future) Role of China in ICT Standardisation – A European Perspective. Proc. 8th Int. Conf. on Standardisation & Innovation in Information Technology
2013
fileadmin/papers/2013/2013_Jakobs_SIIT1.pdf
Proc. 8th Int. Conf. on Standardisation & Innovation in Information Technology
1
KaiJakobs
MartinaGerst
inproceedings
2013_Jakobs_SIIT2
Success in ICT Standards Setting – A Closer Look at Some Influencing Factors
2013
fileadmin/papers/2013/2013_Jakobs_SIIT2.pdf
Proc. 8th Int. Conf. on Standardisation & Innovation in Information Technology.
1
KaiJakobs
inproceedings
2013_Jakobs_EURAS1
Strategic positioning in ICT Standardisation.
2013
fileadmin/papers/2013/2013_Jakobs_EURAS1.pdf
Proceedings of the 18th EURAS Conference. EURAS contributions to standardisation research, vol. 7.
1
KaiJakobs
inproceedings
2013_Jakobs_Seoul
Looking East – How Does Europe Perceive the (Future) Role of China in ICT Standardisation
2013
fileadmin/papers/2013/2013_Jakobs_Seoul.pdf
Proceedings Workshop ‘A New Wave in Global Standardization from Asia’
1
KaiJakobs
phdthesis
2013-kunz-phdthesis
Exploiting Multi-core Systems for Parallel Network Simulation
2013
RWTH Aachen University
GeorgKunz
phdthesis
2013-sasnaukas-phdthesis
Symbolic Execution of Distributed Systems
2013
RWTH Aachen University
RaimondasSasnaukas
phdthesis
2013-weingaertner-phdthesis
Synchronized Performance Evaluation Methodologies for Communication Systems
2013
RWTH Aachen University
EliasWeingärtner