% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-27 % Creation time: 01-29-13 % --- Number of references % 39 % @Article { 2016-kunz-tomacs-horizon, title = {Parallel Expanded Event Simulation of Tightly Coupled Systems}, journal = {ACM Transactions on Modeling and Computer Simulation (TOMACS)}, year = {2016}, month = {1}, volume = {26}, number = {2}, pages = {12:1--12:26}, abstract = {The technical evolution of wireless communication technology and the need for accurately modeling these increasingly complex systems causes a steady growth in the complexity of simulation models. At the same time, multi-core systems have become the de facto standard hardware platform. Unfortunately, wireless systems pose a particular challenge for parallel execution due to a tight coupling of network entities in space and time. Moreover, model developers are often domain experts with no in-depth understanding of parallel and distributed simulation. In combination, both aspects severely limit the performance and the efficiency of existing parallelization techniques. We address these challenges by presenting parallel expanded event simulation, a novel modeling paradigm that extends discrete events with durations which span a period in simulated time. The resulting expanded events form the basis for a conservative synchronization scheme that considers overlapping expanded events eligible for parallel processing. We furthermore put these concepts into practice by implementing Horizon, a parallel expanded event simulation framework specifically tailored to the characteristics of multi-core systems. Our evaluation shows that Horizon achieves considerable speedups in synthetic as well as real-world simulation models and considerably outperforms the current state-of-the-art in distributed simulation.}, keywords = {Parallel discrete event simulation, Multi-core Systems, Wireless Systems, Simulation Modeling Paradigm, Conservative Synchronization}, tags = {horizon}, publisher = {ACM}, language = {en}, DOI = {10.1145/2832909}, reviewed = {1}, author = {Kunz, Georg and Stoffers, Mirko and Landsiedel, Olaf and Wehrle, Klaus and Gross, James} } @Article { 2012-4-alizai-wild-ijdsn, title = {Exploiting the Burstiness of Intermediate Quality Wireless Links}, journal = {International Journal of Distributed Sensor Networks (IJDSN)}, year = {2012}, month = {4}, day = {2}, tags = {wld}, url = {fileadmin/papers/2012/2012-ijdsn-wld-alizai.pdf}, state = {unpublished}, language = {en}, ISSN = {1550-1329}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 2011-ipsn-alizai-pad, title = {Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks}, year = {2011}, month = {4}, url = {fileadmin/papers/2011/2011-ipsn-alizai-pad.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA}, event_place = {Chicago, IL, USA}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and G{\"o}tz, Stefan and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2010-kunz-mascots-horizon, title = {Expanding the Event Horizon in Parallelized Network Simulations}, year = {2010}, month = {8}, day = {18}, pages = {172-181}, abstract = {The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.}, tags = {horizon}, url = {fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA}, event_place = {Miami, FL, USA}, event_name = {18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)}, event_date = {August 17-19, 2010}, language = {en}, ISBN = {978-0-7695-4197-6}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2010.26}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Gross, James and G{\"o}tz, Stefan and Naghibi, Farshad and Wehrle, Klaus} } @Inproceedings { 2010-ipsn-sasnauskas-kleenet, title = {KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment}, year = {2010}, month = {4}, day = {12}, pages = {186--196}, abstract = {Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.}, keywords = {automated protocol testing, experimentation, failure detection, wireless sensor networks}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791235}, reviewed = {1}, author = {Sasnauskas, Raimondas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inproceedings { 20104-IPSN-alizai-svr, title = {Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks}, year = {2010}, month = {4}, day = {12}, pages = {366-367}, abstract = {We present Statistical Vector Routing (SVR), a protocol that efficiently deals with communication link dynamics in wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.}, tags = {wld}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1791257}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, event_place = {Stockholm, Sweden}, event_name = {9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)}, event_date = {April 12-16, 2010}, language = {en}, ISBN = {978-1-60558-988-6}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Vaegs, Tobias and Landsiedel, Olaf and Sasnauskas, Raimondas and Wehrle, Klaus} } @Incollection { 2010-kunz-simtools-deployments, title = {From Simulations to Deployments}, year = {2010}, month = {4}, pages = {83-97}, misc2 = {Print}, editor = {Klaus Wehrle and Mesut G{\"u}nes and James Gross}, publisher = {Springer}, address = {Berlin, Germany}, chapter = {6}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Wittenburg, Georg} } @Inbook { 2010-02-book-alizai-hardware-and-systems, title = {Tools and Modeling Approaches for Simulating Hardware and Systems}, year = {2010}, month = {2}, volume = {1}, pages = {99-117}, url = {http://www.network-simulation.info/}, web_url = {http://www.amazon.com/Modeling-Tools-Network-Simulation-Wehrle/dp/3642123309}, misc2 = {Print}, publisher = {Springer LNCS}, chapter = {Chapter 7}, booktitle = {Modeling and Tools for Network Simulation}, language = {EN}, ISBN = {978-3-642-12330-6}, author = {Alizai, Muhammad Hamad and Gao, Lei and Kempf, Torsten and Landsiedel, Olaf} } @Inproceedings { 20105munawardynamictinyos, title = {Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks}, year = {2010}, pages = {1-6}, abstract = {Long-term deployments of sensor networks in physically inaccessible environments make remote re-programmability of sensor nodes a necessity. Ranging from full image replacement to virtual machines, a variety of mechanisms exist today to deploy new software or to fix bugs in deployed systems. However, TinyOS - the current state of the art sensor node operating system - is still limited to full image replacement as nodes execute a statically-linked system-image generated at compilation time. In this paper we introduce Dynamic TinyOS to enable the dynamic exchange of software components and thus incrementally update the operating system and its applications. The core idea is to preserve the modularity of TinyOS, i.e. its componentization, which is lost during the normal compilation process, and enable runtime composition of TinyOS components on the sensor node. The proposed solution integrates seamlessly into the system architecture of TinyOS: It does not require any changes to the programming model of TinyOS and existing components can be reused transparently. Our evaluation shows that Dynamic TinyOS incurs a low performance overhead while keeping a smaller - upto one third - memory footprint than other comparable solutions.}, url = {fileadmin/papers/2010/2010-05-icc-munawar-DynamicTinyOS.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa}, language = {en}, ISBN = {978-1-4244-6402-9}, ISSN = {1550-3607}, reviewed = {1}, author = {Munawar, Waqaas and Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 2010-ARCS-alizai-promotingpower, title = {Promoting Power to a First Class Metric in Network Simulations}, year = {2010}, pages = {387-392}, abstract = {Accurate prediction of energy consumption early in the design process is essential to efficiently optimize algorithms and protocols. However, despite energy efficiency gathering significant attention in networking research, limited effort has been invested in providing requisite evaluation tools and models. Hence, developers demand powerful evaluation tools to assist them in comparing new communication paradigms in terms of energy efficiency, and minimizing the energy requirements of algorithms. In this paper, we argue for promoting energy to a first class metric in network simulations. We explore the challenges involved in modelling energy in network simulations and present a detailed analysis of different modelling techniques. Finally, we discuss their applicability in high-level network simulations.}, url = {fileadmin/papers/2010/2010-2-ARCS-alizai-promoting-power.pdf}, misc2 = {Print}, publisher = {VDE-VERLAG}, address = {Berlin, Germany}, booktitle = {Proceedings of the Workshop on Energy Aware Systems and Methods, in conjunction with GI/ITG ARCS 2010 Hannover, Feb. 21-23}, language = {en}, ISBN = {978-3-8007-3222-7}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kunz, Georg and Landsiedel, Olaf and Wehrle, Klaus} } @Phdthesis { 2010-landsiedel-phd, title = {Mechanisms, Models, and Tools for Flexible Protocol Development and Accurate Network Experimentation}, year = {2010}, school = {RWTH Aachen University}, author = {Landsiedel, Olaf} } @Inproceedings { 2009-sensys-alizai-burstytraffic, title = {Bursty Traffic over Bursty Links}, year = {2009}, month = {11}, pages = {71-84}, tags = {wld}, url = {fileadmin/papers/2009/2009-alizai-sensys-bre.pdf}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA}, event_place = {Berkley, California}, event_name = {Sensys 09}, event_date = {November 2009}, language = {en}, ISBN = {978-1-60558-519-2}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { 2009-kunz-mascots-horizon, title = {Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation}, year = {2009}, month = {9}, day = {21}, pages = {575-577}, abstract = {This paper presents Horizon, an extension to network simulation that enables the efficient and detailed simulation of wireless networks. Our contributions are two-fold as Horizon provides i) an API for accurately modeling processing time of discrete event simulation models by augmenting events with time spans and ii) a lightweight parallelization scheme that utilizes timing information to guide the parallel execution of simulations on multi-core computers. In this paper we primarily focus on the latter.}, tags = {horizon}, url = {fileadmin/papers/2009/2009-kunz-mascots-horizon.pdf}, misc = {Poster}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), London, UK}, event_place = {London, Great Britain}, event_name = {17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09)}, event_date = {September 21-32, 2009}, language = {en}, ISBN = {978-1-4244-4926-2}, ISSN = {1526-7539}, DOI = {10.1109/MASCOT.2009.5366710}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Wehrle, Klaus} } @Techreport { 200908munawarfgsndynamictinyos, title = {Remote Incremental Adaptation of Sensor Network Applications}, year = {2009}, month = {9}, pages = {9-12}, url = {fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf}, web_url = {http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf}, misc2 = {Print}, publisher = {Technical University Hamburg}, address = {Technical University Hamburg}, booktitle = {Proceedings of the 8th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Hamburg, Germany}, institution = {Technical University Hamburg}, language = {en}, author = {Munawar, Waqaas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Techreport { 200908alizaifgsnburstyrouting, title = {Routing Over Bursty Wireless Links}, year = {2009}, month = {9}, pages = {63-66}, abstract = {Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22\% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.}, tags = {wld}, url = {fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf}, web_url = {doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf}, misc2 = {Print}, publisher = {Technical University Hamburg}, address = {Technical University Hamburg}, booktitle = {Proceedings of the 8th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Hamburg, Germany}, language = {en}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { 2009-landsiedel-visa-vipe, title = {A Virtual Platform for Network Experimentation}, year = {2009}, month = {8}, day = {17}, pages = {45--52}, abstract = {Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive. In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.}, keywords = {deployment, network experimentation, resource virtualization, simulation}, url = {fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf}, misc2 = {Print}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain}, event_place = {Barcelona, Spain}, event_name = {1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures}, event_date = {August 17, 2009}, language = {en}, ISBN = {978-1-60558-595-6}, DOI = {10.1145/1592648.1592657}, reviewed = {1}, author = {Landsiedel, Olaf and Kunz, Georg and G{\"o}tz, Stefan and Wehrle, Klaus} } @Poster { 2009-kunz-nsdi-profab, title = {Poster Abstract: Protocol Factory: Reuse for Network Experimentation}, year = {2009}, month = {4}, day = {22}, url = {fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf}, misc = {Poster}, misc2 = {Online}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, booktitle = {6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)}, language = {en}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and G{\"o}tz, Stefan and Wehrle, Klaus} } @Article { 2009AlizaiPIKtimingenergy, title = {Modelling Execution Time and Energy Consumption in Sensor Node Simulation}, journal = {PIK Journal, Special Issue on Energy Aware Systems}, year = {2009}, month = {2}, volume = {32}, number = {2}, pages = {127-132}, url = {fileadmin/papers/2009/2009-2-alizai-modeling-energy.pdf}, misc2 = {Print}, language = {en}, ISSN = {0930-5157}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus} } @Techreport { 2008-fgsn-alizai-stle, title = {Challenges in Short-term Wireless Link Quality Estimation}, year = {2008}, month = {7}, pages = {27-30}, tags = {wld}, url = {fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf}, web_url = {ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf}, misc2 = {Print}, publisher = {Fachbereich Mathematik und Informatik}, address = {Berlin, Germany}, booktitle = {Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks}, event_name = {FGSN 08}, event_date = {September 2010}, language = {en}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus and Becher, Alexander} } @Inproceedings { 2008-becher-hotemnets-linkestimation, title = {Towards Short-Term Wireless Link Quality Estimation}, year = {2008}, month = {6}, day = {3}, pages = {1--5}, abstract = {Commonly, routing in sensor networks is limited to longterm stable links. Unstable links, although often promising to be of large routing progress, are not considered for packet forwarding as link estimators typically cannot handle their dynamics. In this paper we introduce short-term link estimation to capture link dynamics at a high resolution in time and to identify when these render a link temporarily reliable or unreliable. We identify such dynamics based on packet overhearing, predict short-term availability and unavailability, and adapt neighbor tables, thereby enlarging the set of links useable by any routing algorithm. Additionally, we show that short-term link estimation integrates seamlessly into today's sensor network link estimators and routing protocols.}, tags = {wld}, url = {fileadmin/papers/2008/2008-becher-hotemnets-linkestimation.pdf}, misc2 = {Online}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Charlottesville, VA, USA}, event_place = {Chalottesville, USA}, event_name = {Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08)}, event_date = {June 2-3, 2008}, language = {en}, ISBN = {978-1-60558-209-2}, reviewed = {1}, author = {Becher, Alexander and Landsiedel, Olaf and Kunz, Georg and Wehrle, Klaus} } @Inproceedings { 200804landsiedelIPSN08TimingMatters, title = {When Timing Matters: Enabling Time Accurate \& Scalable Simulation of Sensor Network Applications}, year = {2008}, pages = {344-354}, abstract = {The rising complexity of data processing algorithms in sensor networks combined with their severely limited computing power necessitates an in-depth understanding of their temporal behavior. However, today only cycle accurate emulation and test-beds provide a detailed and accurate insight into the temporal behavior of sensor networks. In this paper we introduce fine grained, automated instrumentation of simulation models with cycle counts derived from sensor nodes and application binaries to provide detailed timing information. The presented approach bridges the gap between scalable but abstracting simulation and cycle accurate emulation for sensor network evaluation. By mapping device-specific code with simulation models, we can derive the time and duration a certain code line takes to get executed on a sensor node. Hence, eliminating the need to use expensive instruction-level emulators with limited speed and restricted scalability. Furthermore, the proposed design is not bound to a specific hardware platform, a major advantage compared to existing emulators. Our evaluation shows that the proposed technique achieves a timing accuracy of 99\% compared to emulation while adding only a small overhead. Concluding, it combines essential properties like accuracy, speed and scalability on a single simulation platform.}, url = {fileadmin/papers/2008/2008-04-IPSN-2008-landsiedel-Timing-Matters.pdf}, misc2 = {Print}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, booktitle = {Proceedings of the 7th ACM International Conference on Information Processing in Sensor Networks (IPSN 2008), St. Louis, MO, USA}, language = {en}, ISBN = {978-0-7695-3157-1}, reviewed = {1}, author = {Landsiedel, Olaf and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Techreport { 2007-fgsn-alizai-timetossim, title = {Accurate Timing in Sensor Network Simulations}, year = {2007}, month = {7}, url = {fileadmin/papers/2008/2007-07-fgsn-alizai-accurate-timing.pdf}, web_url = {https://www.ds-group.info/events/fgsn07/fgsn07proc.pdf}, misc2 = {Print}, publisher = {RWTH Aachen}, address = {Aachen, Germany}, booktitle = {Proceedings of the 6th GI/ITG KuVS Workshop on Wireless Sensor Networks (FGSN 07)}, institution = {RWTH Aachen}, event_place = {Aachen, Germany}, event_name = {FGSN 07}, event_date = {July 2007}, language = {en}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus} } @Article { LandsiedelEtAl2007, title = {MHT: A Mobility-Aware Distributed Hash Table}, journal = {Special Issue on Peer-to-Peer of the it - Information Technology Journal}, year = {2007}, volume = {49}, number = {5}, pages = {298-303}, abstract = {Mobile ad-hoc networks and distributed hash tables share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we discuss practical challenges such as Churn, load balacing and security of the Mobile Hash Table. A special focus is put on the differences and new challenges that the use of a DHT in a mobile environment poses.}, note = {http://it-Information-Technology.de}, misc2 = {Print}, publisher = {Oldenbourg Verlag}, address = {Munich, Germany}, language = {en}, ISSN = {1611-2776}, reviewed = {1}, author = {Landsiedel, Olaf and Heer, Tobias and Wehrle, Klaus} } @Inbook { 2007landsiedelwsnalgpseudo, title = {Pseudo Geometric Routing in Sensor Networks}, year = {2007}, pages = {203-213}, note = {http://www.springer.com/computer/communications/book/978-3-540-74990-5}, editor = {Dorothea Wagner, Roger Wattenhofer}, publisher = {Springer}, series = {Lecture Notes in Computer Science, Theoretical Computer Science and General Issues}, chapter = {11}, booktitle = {Algorithms for Sensor and Ad-Hoc Networks}, author = {Landsiedel, Olaf} } @Conference { 200711Globecom2007Landsiedelmultipathonionrouting, title = {Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks}, year = {2007}, abstract = {Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing a static tunnel through an overlay network is build via layered encryption. All traffic exchanged by its end points is relayed through this tunnel.In contrast, this paper introduces dynamic multipath Onion Routing to extend the static Onion Routing paradigm. This approach allows each packet exchanged between two end points to travel along a different path. To provide anonymity the first half of this path is selected by the sender and the second half by the receiver of the packet. The results are manifold: First, dynamic multipath Onion Routing increases the resilience against threats, especially pattern and timing based analysis attacks. Second, the dynamic paths reduce the impact of misbehaving and overloaded relays. Finally, inspired by Internet routing, the forwarding nodes do not need to maintain any state about ongoing flows and so reduce the complexity of the router. In this paper, we describe the design of our dynamic Multipath Onion Router (MORE) for peer-to-peer overlay networks, and evaluate its performance. Furthermore, we integrate address virtualization to abstract from Internet addresses and provide transparent support for IP applications. Thus, no application-level gateways, proxies or modifications of applications are required to sanitize protocols from network level information. Acting as an IP-datagram service, our scheme provides a substrate for anonymous communication to a wide range of applications using TCP and UDP.}, booktitle = {IEEE Global Communication Conference (GlobeCom), Washington D.C.}, author = {Landsiedel, Olaf and Pimenidis, Alexis and Wehrle, Klaus and Niedermayer, Heiko and Carle, Georg} } @Inproceedings { 200706juriFGSN07platform, title = {Simulation von plattformunabh{\"a}ngigen TinyOS-Applikationen mit ns-2}, year = {2007}, address = {Aachen, Germany}, booktitle = {Proceedings of 6th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks''}, author = {Saragazki, Juri and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 200707SchmidtFGSN07composition, title = {Smart Composition of Sensor Network Applications}, year = {2007}, address = {Aachen, Germany}, booktitle = {Proceedings of 6th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Aachen}, author = {Schmitz, Stefan and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 200606LandsiedelRatWatch, title = {Rat Watch: Using Sensor Networks for Animal Observation}, year = {2006}, month = {6}, day = {19}, volume = {1}, pages = {1--2}, abstract = {In an attempt to employ sensor network technology for animal observation, in particular of wild rats, we identified several restrictive shortcomings in existing sensor network research, which we discuss in this paper.}, note = {(Poster and Abstract)}, tags = {RatPack}, url = {fileadmin/papers/2006/2006-06-Landsiedel-RatWatch.pdf}, web_url2 = {http://www.sics.se/realwsn06/program.html}, misc2 = {Online}, editor = {Pedro Jos{\'e} Marron and Thiemo Voigt}, publisher = {SICS}, address = {Uppsala, Sweden}, booktitle = {ACM Workshop on Real-World Wireless Sensor Networks (RealWSN) in conjunction with ACM MobiSys, Uppsala, Sweden}, organization = {ACM}, event_place = {Uppsala, Sweden}, event_name = {ACM Workshop on Real-World Wireless Sensor Networks, REALWSN'06}, event_date = {June 19, 2006}, language = {en}, reviewed = {1}, author = {Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Thiele, Johannes and Mallot, Hanspeter} } @Inproceedings { 200602LandsiedelEWSNModularSN, title = {Modular Communication Protocols for Sensor Networks}, year = {2006}, month = {2}, day = {13}, volume = {507}, pages = {22 -- 23}, abstract = {In this paper we present our ongoing work on modular communication protocols for sensor networks. Their modularity allows recomposing a protocol dynamically at runtime and adapting it to the changing needs of a sensor network. Compared to existing work, our componentization is fine grained and protocol independent, enabling a high degree of component reusability.}, note = {(Poster and Abstract)}, url = {fileadmin/papers/2006/2006-02-Landsiedel-EWSN-ModularSN.pdf}, web_url2 = {ftp://ftp.inf.ethz.ch/pub/publications/tech-reports/5xx/507.pdf}, misc = {Technical Report}, misc2 = {Online}, editor = {Kay R{\"o}mer and Holger Karl and Friedemann Matterns}, publisher = {Department of Computer Science, ETH Zurich}, address = {Zurich, Switzerland}, series = {Technical Report ETH Zurich / Dept. of Computer Science}, booktitle = {European Workshop on Wireless Sensor Networks (EWSN 2006), Zurich Switzerland}, organization = {EWSN}, event_place = {Zurich, Switzerland}, event_name = {3rd European Workshop on Wireless Sensor Networks (EWSN 2006)}, event_date = {February 13-15, 2006}, language = {en}, reviewed = {1}, author = {Landsiedel, Olaf and Bitsch Link, J{\'o} Agila and Denkinger, Katharina and Wehrle, Klaus} } @Conference { 200607landsiedelfgsnmodular, title = {When Modularity Matters}, year = {2006}, abstract = {In an attempt to employ sensor network technology for animal observation, in particular of wild rats, we identified several restrictive shortcomings in existing sensor network research. In this paper, we present modular and flexible communication protocols as an efficient substrate to address these shortcomings. Their modularity allows recomposing a protocol dynamically at runtime and adapting it to the changing needs of a deployed sensor network.}, booktitle = {5th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Stuttgart, Germany}, author = {Landsiedel, Olaf and Wehrle, Klaus} } @Conference { 200607landsiedelngimodels, title = {Towards flexible and modular simulation models}, year = {2006}, abstract = {In this talk we discuss the increasing need for flexible and modular simulation models and our ongoing work in this area. Although a huge number of simulation models are available today, these models do not interoperate and cannot be easily combined to form a full protocol simulation stack.}, booktitle = {Visions of Future Generation Networks, W{\"u}rzburg, Germany}, author = {Landsiedel, Olaf and Petrak, Leo and Wehrle, Klaus} } @Inproceedings { 200608landsiedelp2p06scalablemobility, title = {Towards Scalable Mobility in Distributed Hash Tables}, year = {2006}, pages = {203-209}, abstract = {For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, we explore how DHTs and mobile ad-hoc networks (MANETs) fit together. We argue that both share key characteristics in terms of self organization, decentralization, redundancy requirements, and limited infrastructure. However, node mobility and the continually changing physical topology pose a special challenge to scalability and the design of a DHT for mobile ad-hoc networks. In this paper, we show that with some local knowledge we can build a scalable and mobile structured peer-to-peer network, called Mobile Hash Table (MHT). Furthermore, we argue that with little global knowledge, such as a map of the city or whatever area the nodes move in, one can even further improve the scalability and reduce DHT maintenance overhead significantly, allowing MHT to scale up to several ten thousands of nodes.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2006/2006-landsiedel-p2p-mobility.pdf}, misc2 = {print}, publisher = {IEEE}, address = {Washington, DC, USA}, howpublished = {print}, booktitle = {Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), Cambridge, UK}, organization = {IEEE}, event_place = {Cambridge, UK}, event_name = {Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06)}, event_date = {2006-09-06}, language = {en}, ISBN = {0-7695-2679-9}, DOI = {10.1109/P2P.2006.46}, reviewed = {1}, author = {Landsiedel, Olaf and G{\"o}tz, Stefan and Wehrle, Klaus} } @Inproceedings { landsiedel2005anonymous, title = {Anonymous IP-Services via Overlay Routing}, year = {2005}, month = {3}, abstract = {Although research provides anonymous Internet communication schemes, anonymous IP-services received only limited attention. In this paper we present SARA (Anonymous Overlay Routing Providing Sender And Receiver Anonymity), which enables sender, receiver and relationship anonymity using layered encryption and distributed traffic mixes, similar to a Chaumian Mix. Via IP-datagram service and address virtualization it is fully transparent to applications. Organized as structured Peer-To-Peer system, SARA is highly scalable and fault tolerant. In SARA each communication partner randomly selects a number of nodes from the overlay and concatenates them to an anonymous communication path. The sender selects the head of the path, the receiver builds the tail and publishes this information in the overlay network using an anonymous ID. Via this ID the sender retrieves the tail nodes of the path and concatenates both path section. Layered encryption hides the identities of the sender, receiver and the intermediate nodes.}, booktitle = {5. W{\"u}rzburger ''Workshop IP Netzmanagement, IP Netzplanung und Optimierung''}, event_place = {W{\"u}rzburg, Germany}, event_name = {5. W{\"u}rzburger ''Workshop IP Netzmanagement, IP Netzplanung und Optimierung''}, event_date = {March 2005}, author = {Landsiedel, Olaf and Rieche, Simon and Niedermayer, Heiko and Wehrle, Klaus and Carle, Georg} } @Article { 200504landsiedelpikenergy, title = {Enabling Detailed Modeling and Analysis of Sensor Networks}, journal = {Special Issue on Sensor Networks, PIK Journal}, year = {2005}, volume = {28}, number = {2}, abstract = {Simulation is the de-facto standard tool for the evaluation of distributed and communication systems like sensor networks. Most simulation efforts focus on protocol- and algorithm-level issues, thus depending on the right choice and configuration of models. However, as such models commonly neglect time dependent issues, many research challenges, like energy consumption and radio channel utilization still remain. In this article we present two new tools to model and analyze sensor networks: Avrora, a fast and accurate sensor network simulator, and AEON, a novel tool built on top of Avrora, to evaluate the energy consumption and to accurately predict the lifetime of sensor networks. Avrora is a highly scalable instruction-level simulator for sensor network programs. It simulates the execution of the program down to the level of individual clock cycles, a time quantum of about 135 ns. By incorporating state of the art simulation techniques, including an efficiently maintained event queue, fast-forward through sleep-time, and parallel simulation, it can simulate entire networks of nodes in real time. AEON's energy model is based on Avrora and makes use of the cycle accurate execution of sensor node applications for precise energy measurements. Due to limited energy resources, power consumption is a crucial characteristic of sensor networks. AEON uses accurate measurements of node current draw and the execution of real code to enable accurate prediction of the actual power consumption of sensor nodes. Consequently, it prevents erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency. Thus, it enables a highly precise estimation of the overall lifetime of a sensor network.}, author = {Landsiedel, Olaf and Wehrle, Klaus and Titzer, Ben L and Palsberg, Jens} } @Conference { 200509petraksoftcommobility, title = {Towards Realistic Strategy-Based Mobility Models for Ad Hoc Communication}, year = {2005}, booktitle = {Proceedings of the 2005 Conference on Software for Communication Systems and Computer Networks}, author = {Petrak, Leo and Landsiedel, Olaf and Wehrle, Klaus} } @Conference { 200509landsiedelp2ptdht, title = {T-DHT: Topology-Based Distributed Hash Tables}, year = {2005}, abstract = {In this paper, we introduce topology-based distributed hash tables (T-DHT) as an infrastructure for data-centric storage, information processing, and routing in ad hoc and sensor networks. T-DHTs do not rely on location information and work even in the presence of voids in the network. Using a virtual coordinate system, we construct a distributed hash table which is strongly oriented to the underlying network topology. Thus, adjacent areas in the hash table commonly have a direct link in the network. Routing in the T-DHT guarantees reachability and introduces low hop-overhead compared with the shortest path.}, booktitle = {Proceedings of Fifth International IEEE Conference on Peer-to-Peer-Computing, Konstanz, Germany}, author = {Landsiedel, Olaf and Lehmann, Katharina and Wehrle, Klaus} } @Inproceedings { 200503landsiedelfgsnaeon, title = {Project AEON}, year = {2005}, number = {481}, pages = {72-76}, abstract = {Power consumption is a crucial characteristic of sensor networks and their applications, as sensor nodes are commonly battery driven. Although recent research focuses strongly on energy aware applications and operating systems, power consumption is still a limiting factor. Once sensor nodes are deployed, it is challenging and sometimes even impossible to change batteries. As a result, erroneous lifetime prediction causes high costs and may render a sensor network useless, before its purpose is fulfilled. In this paper we present AEON, a novel evaluation tool to quantitatively predict power consumption of sensor nodes and whole sensor networks. Our energy model, based on measurements of node current draw and the execution of real code, enables accurate prediction of the actual power consumption of sensor nodes. Consequently, preventing erroneous assumptions on node and network lifetime. Moreover, our detailed energy model allows to compare different low power and energy aware approaches in terms of energy efficiency.}, address = {Z{\"u}rich, CH}, booktitle = {Proceedings of the 4th GI/ITG KuVS Fachgespr{\"a}ch ''Wireless Sensor Networks'', Techical Report No. 481}, author = {Landsiedel, Olaf and Wehrle, Klaus and Rieche, Simon and G{\"o}tz, Stefan and Petrak, Leo} } @Inproceedings { 200410riechehotp2preliability, title = {Reliability of Data in Structured Peer-to-Peer Systems}, year = {2004}, month = {10}, pages = {108-113}, abstract = {Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. For this purpose Distributed Hash Tables (DHT) offer a highly scalable and self-organizing paradigm for efficient distribution and retrieval of data. Thereby a common assumption of P2P-Systems is, that the participating nodes are unreliable and may fail at any time. Since many of research goes into the design of DHT lookup services, these systems aim to provide a stable global addressing structure. But to storage data reliable in a DHT only few techniques were already developed. However since data has to be stored persistent in the network, it should be retrieved anytime, even if nodes fail. In this work we discuss possibilities to store data fault tolerant in a structured Peer-to-Peer system.}, misc2 = {Print}, booktitle = {Proceedings of HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)}, event_place = {Volendam, Netherlands}, event_name = {HOT-P2P '04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer}, event_date = {Oct. 2004}, language = {en}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Landsiedel, Olaf and G{\"o}tz, Stefan and Petrak, Leo} } @Inproceedings { 200410wehrlefgpcintegriertekonstruktionsmethode, title = {Integrierte Konstruktionsmethoden f{\"u}r flexible Protokolle in ubiquit{\"a}ren Kommunikationssystemen}, year = {2004}, address = {Stuttgart, Germany}, booktitle = {Proceedings of the GI/ITG KuVS Fachgespr{\"a}ch Systemsoftware f{\"u}r Pervasive Computing}, author = {Wehrle, Klaus and Landsiedel, Olaf and Rieche, Simon and G{\"o}tz, Stefan and Petrak, Leo} }