This file was created by the TYPO3 extension
bib
--- Timezone: UTC
Creation date: 2025-01-02
Creation time: 11-52-22
--- Number of references
62
techreport
draft-irtf-coinrg-use-cases-06
Use Cases for In-Network Computing
2022
3
draft-irtf-coinrg-use-cases-06
expires: 8 September 2022 (work in progress)
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-irtf-coinrg-use-cases-02.pdf
https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/
Online
IETF Trust
Internet Drafts
Internet Engineering Task Force
Internet Engineering Task Force
IkeKunze
KlausWehrle
DirkTrossen
Marie-JoséMontpetit
Xavierde Foy
DavidGriffin
MiguelRio
techreport
draft-kunze-coinrg-transport-issues-05
Transport Protocol Issues of In-Network Computing Systems
2021
10
draft-kunze-coinrg-transport-issues-05
Expires: 28 April 2022 (work in progress)
https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/draft-kunze-coinrg-transport-issues-05.pdf
https://datatracker.ietf.org/doc/draft-kunze-coinrg-transport-issues/
IETF Trust
Internet Drafts
Internet Engineering Task Force
Internet Engineering Task Force
IkeKunze
KlausWehrle
DirkTrossen
techreport
2019-rueth-blitzstart
Blitz-starting QUIC Connections
2019
5
8
arXiv:1905.03144 [cs.NI]
1--8
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-rueth-blitzstart.pdf
https://arxiv.org/abs/1905.03144
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
JanRüth
KonradWolsing
MartinSerror
KlausWehrle
OliverHohlfeld
techreport
2019-hohlfeld-santa-tr
Application-Agnostic Offloading of Packet Processing
2019
4
1
arXiv:1904.00671 [cs.NI]
1--14
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2019/2019-hohlfeld-santatr.pdf
https://arxiv.org/abs/1904.00671
Online
COMSYS, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
COMSYS, RWTH Aachen University
Technical Report
en
OliverHohlfeld
HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
techreport
2016-henze-aib-sensorcloud
The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud
2016
7
11
AIB-2016-06
arXiv:1607.03239 [cs.NI]
1--24
sensorcloud
fileadmin/papers/2016/2016-henze-aib-sensorcloud.pdf
Online
Department of Computer Science, RWTH Aachen University
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen University
Technical Report
en
0935-3232
MartinHenze
RenéHummen
RomanMatzutt
KlausWehrle
techreport
2015-draft-moskowitz-hip-dex-04
HIP Diet EXchange (DEX)
2015
7
20
draft-moskowitz-hip-dex-04
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-04
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2015-draft-moskowitz-hip-dex-03
HIP Diet EXchange (DEX)
2015
6
19
draft-moskowitz-hip-dex-03
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-03
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2014-draft-moskowitz-hip-dex-02
HIP Diet EXchange (DEX)
2014
12
19
draft-moskowitz-hip-dex-02
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-02
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2015-aib-schmidt-hotbox
HotBox: Testing Temperature Effects in Sensor Networks
2014
12
4
AIB-2014-14
arXiv:1412.2257 [cs.NI]
1--17
senserr
fileadmin/papers/2014/2014-schmidt-aib-hotbox.pdf
Online
Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen
Technical Report
en
0935-3232
FlorianSchmidt
MatteoCeriotti
NiklasHauser
KlausWehrle
techreport
2014-draft-moskowitz-hip-dex-01
HIP Diet EXchange (DEX)
2014
3
4
draft-moskowitz-hip-dex-01
This document specifies the Host Identity Protocol Diet EXchange (HIP
DEX), a variant of the HIP Base EXchange (HIP BEX) [rfc5201-bis].
The HIP DEX protocol design aims at reducing the overhead of the
employed cryptographic primitives by omitting public-key signatures
and hash functions. In doing so, the main goal is to still deliver
similar security properties to HIP BEX.
The HIP DEX protocol is primarily targeted at computation or memory-constrained sensor devices. Like HIP BEX, it is expected to be used
together with another suitable security protocol such as the
Encapsulated Security Payload (ESP) [rfc5202-bis] for the protection
of upper layer protocols. HIP DEX can also be used as a keying
mechanism for a MAC layer security protocol as is supported by IEEE
802.15.4 [IEEE.802-15-4.2011].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-01
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
techreport
2013-schmidt-rtp-extended
Support for Error Tolerance in the Real-Time Transport Protocol
2013
12
20
AIB-2013-19
arXiv:1312.5892 [cs.NI]
1--24
refector
fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf
Online
Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen
Technical Report
en
0935-3232
FlorianSchmidt
DavidOrlea
KlausWehrle
techreport
2013-draft-hummen-dtls-extended-session-resumption-01
Extended DTLS Session Resumption for Constrained Network Environments
2013
10
18
draft-hummen-dtls-extended-session-resumption-01
This draft defines two extensions for the existing session resumption
mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in
constrained network environments. Session resumption type
negotiation enables the client and the server to explicitly agree on
the session resumption mechanism for subsequent handshakes, thus
avoiding unnecessary overheads occurring with the existing
specifications. Session resumption without client-side state
additionally enables a constrained DTLS client to resume a session
without the need to maintain state while the session is inactive.
The extensions defined in this draft update [RFC5077] and [RFC5246].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
JohannesGilger
HosseinShafagh
techreport
2013-ceriotti-fgsn-appcentric
Towards Application-Centric Deployment of Low-Power Wireless Networks
2013
9
13
SEEMOO-TR-2013-0
12. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze"
TU Cottbus
Technical Report
MatteoCeriotti
AlexandrKrylovskiy
KlausWehrle
techreport
2013-draft-garcia-core-security-06
Security Considerations in the IP-based Internet of Things
2013
9
11
draft-garcia-core-security-06
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-06
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
draft-hummen-dtls-extended-session-resumption-00
Extended DTLS Session Resumption for Constrained Network Environments
2013
7
15
draft-hummen-dtls-extended-session-resumption-00
This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-00
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
JohannesGilger
techreport
2013-draft-garcia-core-security-05
Security Considerations in the IP-based Internet of Things
2013
3
11
draft-garcia-core-security-05
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-05
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2013-draft-hummen-hip-middle-puzzle-01
HIP Middlebox Puzzle Offloading and End-host Notification
2013
1
9
draft-hummen-hip-middle-puzzle-01
The Host Identity Protocol [RFC5201] is a secure signaling protocol with a cryptographic namespace. It provides the communicating peers with a cryptographic puzzle mechanism to protect against Denial of Service (DoS) attacks exploiting the computation and memory overheads of the protocol exchange. This document specifies an extension of the protocol that enables an on-path network entity to assist in the choice of the puzzle difficulty in case of an attack. Furthermore, it defines a modification of the puzzle mechanism that enables a host to delegate puzzle solving to an on-path network entity.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-hip-middle-puzzle-01
Online
Internet Engineering Task Force
Internet-Draft
en
RenéHummen
MartinHenze
JensHiller
techreport
2012-weingaertner-fgsn-sim-iot
How to simulate the Internet of Things?
2012
9
26
SEEMOO-TR-2012-0
11. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze"
TU Darmstadt
Sammelband der Beiträge zum 11. GI/ITG KuVS Fachgespräch "Drahtlose Sensornetze" (Technical Report)
EliasWeingaertner
MatteoCeriotti
KlausWehrle
techreport
2012-draft-hummen-hip-middle-puzzle
HIP Middlebox Puzzle Offloading and End-host Notification
2012
7
9
draft-hummen-hip-middle-puzzle-00
The Host Identity Protocol [RFC5201] is a secure signaling protocol with a cryptographic namespace. It provides the communicating peers with a cryptographic puzzle mechanism to protect against Denial of Service (DoS) attacks targeting its computation and memory overhead. This document specifies an extension that enables middleboxes to assist in the choice of the puzzle difficulty as well as in solving the puzzle on behalf of the host.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-hummen-hip-middle-puzzle-00
Internet Engineering Task Force
Internet-Draft
RenéHummen
MartinHenze
techreport
2012-draft-garcia-core-security
Security Considerations in the IP-based Internet of Things
2012
3
26
draft-garcia-core-security-04
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-04
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2011-draft-garcia-core-security-03
Security Considerations in the IP-based Internet of Things
2011
10
31
draft-garcia-core-security-03
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-03
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2011-draft-garcia-core-security-02
Security Considerations in the IP-based Internet of Things
2011
7
11
draft-garcia-core-security-02
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-02
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
rfc6253
<prt>Host Identity Protocol Certificates</prt>
2011
5
rfc6253
The Certificate (CERT) parameter is a container for digital
certificates. It is used for carrying these certificates in Host Identity Protocol (HIP) control packets.
This document specifies the CERT parameter and the error signaling in case of a failed verification.
Additionally, this document specifies the representations of Host Identity Tags in X.509 version 3 (v3) and Simple Public Key Infrastructure (SPKI) certificates.
The concrete use of certificates, including how certificates are obtained, requested, and which actions are taken upon successful or failed verification, is specific to the scenario in which the certificates are used.
Hence, the definition of these scenario- specific aspects is left to the documents that use the CERT parameter.
mobile_access
http://www.ietf.org/rfc/rfc6253.txt
IETF
RFC 6253 (Experimental)
Request for Comments
Internet Engineering Task Force
Internet Engineering Task Force
Request For Commments (Experimental Standard)
1
TobiasHeer
SamuVarjonen
techreport
2011-draft-garcia-core-security-01
Security Considerations in the IP-based Internet of Things
2011
3
14
draft-garcia-core-security-01
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-01
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
2011-draft-garcia-core-security-00
Security Considerations in the IP-based Internet of Things
2011
3
7
draft-garcia-core-security-00
A direct interpretation of the Internet of Things concept refers to
the usage of standard Internet protocols to allow for human-to-thing
or thing-to-thing communication. Although the security needs are
well-recognized, it is still not fully clear how existing IP-based
security protocols can be applied to this new setting. This
Internet-Draft first provides an overview of security architecture,
its deployment model and general security needs in the context of the
lifecycle of a thing. Then, it presents challenges and requirements
for the successful roll-out of new applications and usage of standard
IP-based security protocols when applied to get a functional Internet
of Things.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-garcia-core-security-00
Online
Internet Engineering Task Force
Internet-Draft
en
OscarGarcia-Morchon
Sye LoongKeoh
Sandeep S.Kumar
RenéHummen
RenéStruik
techreport
rfc5201-bis-04
<prt>Host Identity Protocol Version 2</prt>
2011
1
1
draft-ietf-hip-rfc5201-bis-04.txt
<prt>expires: July 24, 2011 (work in progress)</prt>
mobile_access
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
Thomas R.Henderson
TobiasHeer
techreport
draft-ietf-hip-cert-08
<prt>Host Identity Protocol Certificates</prt>
2011
1
1
draft-ietf-hip-cert-08.txt
<prt>expires: July 22, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-08
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-08
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-07
<prt>Host Identity Protocol Certificates</prt>
2011
1
1
draft-ietf-hip-cert-07.txt
<prt>expires: July 16, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-07
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-07
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-09
<prt>Host Identity Protocol Certificates</prt>
2011
1
1
draft-ietf-hip-cert-09.txt
1
<prt>expires: July 22, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-09
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-09
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
2011-heer-draft-middle-auth
End-Host Authentication for HIP Middleboxes (Version 4)
2011
draft-heer-hip-middle-auth-04
The Host Identity Protocol [RFC5201] is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension allows middleboxes to verify the liveness and freshness of a HIP association and, thus, to secure access control in middleboxes.
Work in progress
ietf, mobile_access
http://tools.ietf.org/html/draft-heer-hip-middle-auth-04
Online
Internet Engineering Task Force
Internet-Draft
en
TobiasHeer
MiikaKomu
RenéHummen
KlausWehrle
techreport
draft-ietf-hip-cert-06
<prt>Host Identity Protocol Certificates</prt>
2010
11
1
draft-ietf-hip-cert-06.txt
<prt>expires: May 23, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-06
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-06
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-05
<prt>Host Identity Protocol Certificates</prt>
2010
11
1
draft-ietf-hip-cert-05.txt
<prt>expires: May 12, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-05
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-05
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
rfc5201-bis-03
<prt>Host Identity Protocol Version 2</prt>
2010
10
1
draft-ietf-hip-rfc5201-bis-03.txt
<prt>expires: April 26, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
draft-ietf-hip-cert-04
<prt>Host Identity Protocol Certificates</prt>
2010
9
1
draft-ietf-hip-cert-04.txt
<prt>expires: March 27, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-04
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-04
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
9
1
draft-ietf-hip-rfc5201-bis-01.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
moskowitz-rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-moskowitz-hip-rfc5201-bis-02.txt
<prt>expires: January 2, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-ietf-hip-rfc5201-bis-02.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
draft-ietf-hip-cert-03
<prt>Host Identity Protocol Certificates</prt>
2010
4
1
draft-ietf-hip-cert-03.txt
<prt>expires: October 30, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
moskowitz-rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
3
1
draft-moskowitz-hip-rfc5201-bis-01.txt
<prt>expires: September 10, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz Pekka Nikander
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
draft-ietf-hip-cert-02
<prt>Host Identity Protocol Certificates</prt>
2009
10
1
draft-ietf-hip-cert-02.txt
<prt>expires: April 29, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
200908munawarfgsndynamictinyos
Remote Incremental Adaptation of Sensor Network Applications
2009
9
9-12
fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf
http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
Technical University Hamburg
en
WaqaasMunawar
OlafLandsiedel
Muhammad HamadAlizai
KlausWehrle
techreport
200908alizaifgsnburstyrouting
Routing Over Bursty Wireless Links
2009
9
63-66
Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.
wld
fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf
doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
en
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
techreport
draft-ietf-hip-cert-01
<prt>Host Identity Protocol Certificates</prt>
2009
6
1
draft-ietf-hip-cert-01.txt
<prt>expires: January 2, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
2009-heer-draft-midauth
End-Host Authentication for HIP Middleboxes (Version 2)
2009
draft-heer-hip-midauth-02
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
MiikaKomu
KlausWehrle
techreport
2009-heer-draft-service-id
Service Identifiers for HIP
2009
draft-heer-hip-service-00
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables HIP end-hosts and HIP-aware middleboxes to announce services to HIP hosts during a HIP Base EXchange (BEX) or HIP update. Service providers are able to specify the type and requirements of a service; clients can then decide to agree on the terms of service. This allows the service provider to verify the accordance of the client with the service conditions while the client is able to verify the authenticity of the used service.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
SamuVarjonen
HannoWirtz
techreport
draft-ietf-hip-cert-00
<prt>Host Identity Protocol Certificates</prt>
2008
10
1
draft-ietf-hip-cert-00.txt
<prt>expires: January 2, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-00
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-00
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
2008-fgsn-sasnauskas-kleenet
Bug Hunting in Sensor Network Applications
2008
9
Testing sensor network applications is an essential and a difficult task. Due to their distributed and faulty nature, severe resource constraints, unobservable interactions, and limited human interaction, sensor networks, make monitoring and debugging of applications strenuous and more challenging.
In this paper we present KleeNet - a Klee based platform independent bug hunting tool for sensor network applications before deployment - which can automatically test applications for all possible inputs, and hence, ensures memory safety for TinyOS based applications. Upon finding a bug,
KleeNet generates a concrete test case with real input values identifying a specific error path in a program. Additionally, we show that KleeNet integrates well into TinyOS application development life cycle with minimum manual effort, making it easy for developers to test their applications.
kleenet
fileadmin/papers/2008/2008-09-Sasnauskas-FGSN08-BugHunting.pdf
ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf
Print
Freie Universität Berlin, Institute of Computer Science
Berlin, Germany
Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany
Chair of Communication and Distributed Systems (ComSys)
en
1
RaimondasSasnauskas
Jó AgilaBitsch Link
Muhammad HamadAlizai
KlausWehrle
techreport
draft-varjonen-hip-cert-01
<prt>Host Identity Protocol Certificates</prt>
2008
7
1
draft-varjonen-hip-cert-01.txt
<prt>expires: January 15, 2009 (work in progress)</prt>
http://tools.ietf.org/html/draft-varjonen-hip-cert-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
2008-fgsn-alizai-stle
Challenges in Short-term Wireless Link Quality Estimation
2008
7
27-30
wld
fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf
ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf
Print
Fachbereich Mathematik und Informatik
Berlin, Germany
Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks
FGSN 08
September 2010
en
1
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
AlexanderBecher
techreport
draft-varjonen-hip-cert-00
<prt>Host Identity Protocol Certificates</prt>
2008
2
1
draft-varjonen-hip-cert-01.txt
<prt>expires: August 21, 2008 (work in progress)</prt>
http://tools.ietf.org/html/draft-varjonen-hip-cert-00
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
TobiasHeer
SamuVarjonen
techreport
200807VOMLEHNAIB200816NetworkSimulatorComparison
Comparing recent network simulators: A performance evaluation study
Aachener Informatik Berichte
2008
2008-16
AIB 2008-16
1-28
Ranging from the development of new protocols to validating analytical performance metrics, network simulation is the most prevalent methodology in the field of computer network research. While the well known ns-2 toolkit has established itself as the quasi standard for network simulation, the successors are on their way. In this paper, we first survey recent contributions in the field of network simulation tools as well as related aspects such as parallel network simulation. Moreover, we present preliminary results which compare the resource demands for ns-3, JiST, SimPy and OMNeT++ by implementing the identical simulation scenario in all these network simulation tools.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/AIB-2008-16.pdf
Online
Ahornstr. 55, Aachen, Germany
RWTH Aachen University
Technical Report
0935-3232
Hendrikvom Lehn
EliasWeingaertner
KlausWehrle
techreport
2008-heer-draft-cert-2
HIP Certificates (Version 0)
2008
This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.
Work in progress
Internet Engineering Task Force
Internet-Draft
SamuVarjonen
TobiasHeer
techreport
2008-heer-draft-midauth
End-Host Authentication for HIP Middleboxes (Version 1)
2008
draft-heer-hip-midauth-01
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
MiikaKomu
KlausWehrle
techreport
2008-heer-draft-cert
HIP Certificates (Version 1)
2008
This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.
draft-varjonen-hip-cert-01.txt. Work in progress.
Internet Engineering Task Force
Internet-Draft
SamuVarjonen
TobiasHeer
techreport
2007-fgsn-alizai-timetossim
Accurate Timing in Sensor Network Simulations
2007
7
fileadmin/papers/2008/2007-07-fgsn-alizai-accurate-timing.pdf
https://www.ds-group.info/events/fgsn07/fgsn07proc.pdf
Print
RWTH Aachen
Aachen, Germany
Proceedings of the 6th GI/ITG KuVS Workshop on Wireless Sensor Networks (FGSN 07)
RWTH Aachen
Aachen, Germany
FGSN 07
July 2007
en
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
techreport
200706WeingaertnerFGSN07HSVNPrototype
A prototype study on Hybrid Sensor-Vehicular Networks
Proceedings of the 2007 GI Special Interest Meeting ("Fachgespraech") on Wireless Sensor Networks
2007
1-4
Proceedings published as technical report at RWTH Aachen.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2007/2007-weingaertner-kargl-fgsn.pdf
Klaus Wehrle
RWTH Aachen University
Bonn, Germany
RWTH Aachen
Aachen, Germany
Fachgespraech Sensornetzwerke
16.7.2007 / 17.7.2007
A prototype study on Hybrid Sensor-Vehicular Networks
0935-3232
1
EliasWeingaertner
FrankKargl
techreport
2007-heer-draft-lhip
LHIP Lightweight Authentication Extension for HIP
2007
This document specifies the Lightweight authentication extension forthe Host Identifier Protocol (LHIP). The goal of LHIP is to reduce the computational requirements of the Host Identifier Protocol (HIP), thus, making its benefits, such as end-host mobility and multihoming, accessible to CPU-restricted devices. LHIP reduces the computational cost of establishing, updating, and closing a HIP association by providing an alternative way of signing and verifying HIP control packets which is based on computationally inexpensive hash function computations and hash chains. However, LHIP does not provide nor does it aim at providing the same level of security as HIP does. Especially, host authentication and payload encryption are not possible. The LHIP extensions in this draft specify also mechanisms for dynamic transitioning between lightweight and full HIP associations on the fly.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
techreport
200707SNFGProceedings
6. Fachgespräch Sensornetzwerke der GI/ITG Fachgruppe "Kommunikation und Verteilte Systeme"
2007
AIB 2007-11
Aachen, Germany
Distributed Systems Group, RWTH Aachen University
Proceedings of Workshop
KlausWehrle
techreport
2007-heer-draft-midauth
End-Host Authentication for HIP Middleboxes
2007
draft-heer-hip-midauth-00
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
techreport
200608riechetrmmog
Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games
2006
8
WSI-2006-04
Online games are an interesting challenge and chance for the future development of the Peer-to-Peer paradigm. Massively multiplayer online games (MMOGs) are becoming increasingly popular today. However, even high-budget titles like World of Warcraft that have gone through extensive beta-testing suffer from downtimes because of hard- and software problems. Our approach is to use structured P2P technology for the server infrastructure of MMOGs to improve their reliability and scalability. Such P2P networks are also able to adapt to the current state of the game and handle uneven distributions of the players in the game world. Another feature of our approach is being able to add supplementary servers at runtime. Our system allows using off-the-shelf PCs as infrastructure peers for participation in different game worlds as needed. Due to the nature of the Economy of Scale the same number of hosts will provide a better service than dedicated servers for each game world.
RWTH Aachen University - Distributed Systems Group
http://www.rieche.net/pdf/wsi-2006-04.pdf
Online
Tübingen, Germany
Wilhelm-Schickard-Institute for Computer Science, University of Tübingen
Technical Report
en
SimonRieche
MarcFouquet
HeikoNiedermayer
LeoPetrak
KlausWehrle
GeorgCarle
techreport
200605OCALATechReportUCB
OCALA: An Architecture for Supporting Legacy Applications over Overlays
2005
UCB/CSD-005/1397
The ever increasing demand of new applications coupled with the increasing rigidity of the Internet has led researchers to propose overlay networks as a means of introducing new functionality in the Internet. However, despite sustained efforts, few overlays are used widely. Providing support for legacy Internet applications to access such overlays would significantly expand the user base of the overlays, as the users can instantly benefit from the overlay functionality. We present the design and implementation of OCALA, an Overlay Convergence Architecture for Legacy Applications. Unlike previous efforts, OCALA allows users to access different overlays simultaneously, as well as hosts in different overlays to communicate with each other. In addition, OCALA reduces the implementation burden on the overlay developers, by factoring out the functions commonly required to support legacy applications, such as tapping legacy traffic, authentication and encryption. Our implementation of OCALA as a proxy requires no changes to the applications or operating systems. We currently support two overlays, i3 and RON, on Linux and Windows XP/2000 platforms. We (and a few other research groups and end-users) have used the proxy over a eleven-month period with many legacy applications ranging from web browsers to remote desktop applications.
http://ocala.cs.berkeley.edu
UCB, Berkeley, USA
University of California at Berkeley
DilipJoseph
JayanthkumarKannan
AyumuKubota
IonStoica
KlausWehrle
techreport
200606i3proxytechreport
Supporting Legacy Applications over i3
2004
UCB/CSD-04-1342
Providing support for legacy applications is a crucial component of many overlay networks, as it allows end-users to instantly benefit from the functionality introduced by these overlays. This paper presents the design and implementation of a proxy-based solution to support legacy applications in the context of the i3 overlay [24]. The proxy design relies on an address virtualization technique which allows the proxy to tunnel the legacy traffic over the overlay transparently. Our solution can preserve IP packet headers on an end-to-end basis, even when end-host IP addresses change, or when endhosts live in different address spaces (e.g., behind NATs). In addition, our solution allows the use of human-readable names to refer to hosts or services, and requires no changes to applications or operating systems. To illustrate how the proxy enables legacy applications to take advantage of the overlay (i.e., i3) functionality, we present four examples: enabling access to machines behind NAT boxes, secure Intranet access, routing legacy traffic through Bro, an intrusion detection system, and anonymous web download. We have implemented the proxy on Linux andWindows XP/2000 platforms, and used it over the i3 service on PlanetLab over a three month period with a variety of legacy applications ranging from web browsers to operating system-specific file sharing.
http://i3.cs.berkeley.edu
UCB, Berkeley, USA
University of California at Berkeley
Technical Report
JayanthkumarKannan
AyumuKubota
KarthikLakshminarayanan
IonStoica
KlausWehrle