% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-07-03 % Creation time: 09-24-16 % --- Number of references % 52 % @Techreport { 2013-schmidt-rtp-extended, title = {Support for Error Tolerance in the Real-Time Transport Protocol}, year = {2013}, month = {12}, day = {20}, number = {AIB-2013-19}, number2 = {arXiv:1312.5892 [cs.NI]}, pages = {1--24}, tags = {refector}, url = {fileadmin/papers/2013/2013-schmidt-aib-rtp.pdf}, misc2 = {Online}, publisher = {Department of Computer Science, RWTH Aachen}, address = {Ahornstr. 55, 52074 Aachen, Germany}, institution = {Department of Computer Science, RWTH Aachen}, type = {Technical Report}, language = {en}, ISSN = {0935-3232}, author = {Schmidt, Florian and Orlea, David and Wehrle, Klaus} } @Inproceedings { 2013-cloudcom-henze-cloud-data-handling, title = {Towards Data Handling Requirements-aware Cloud Computing (Poster Abstract)}, year = {2013}, month = {12}, day = {2}, pages = {266-269}, tags = {ipacs}, url = {fileadmin/papers/2013/2013-cloudcom-henze-cloud-data-handling.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Bristol, UK}, event_place = {Bristol, UK}, event_name = {2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013)}, language = {en}, ISBN = {978-0-7695-5095-4}, DOI = {10.1109/CloudCom.2013.145}, reviewed = {1}, author = {Henze, Martin and Gro{\ss}fengels, Marcel and Koprowski, Maik and Wehrle, Klaus} } @Article { 2013-ijghpc-henze-sensorcloud, title = {Maintaining User Control While Storing and Processing Sensor Data in the Cloud}, journal = {International Journal of Grid and High Performance Computing (IJGHPC)}, year = {2013}, month = {12}, volume = {5}, number = {4}, pages = {97-112}, tags = {sensorcloud}, url = {fileadmin/papers/2013/2013-ijghpc-henze-sensorcloud.pdf}, misc2 = {Online}, publisher = {IGI Global}, language = {en}, ISSN = {1938-0259}, DOI = {10.4018/ijghpc.2013100107}, reviewed = {1}, author = {Henze, Martin and Hummen, Ren{\'e} and Matzutt, Roman and Catrein, Daniel and Wehrle, Klaus} } @Techreport { 2013-draft-hummen-dtls-extended-session-resumption-01, title = {Extended DTLS Session Resumption for Constrained Network Environments}, year = {2013}, month = {10}, day = {18}, number = {draft-hummen-dtls-extended-session-resumption-01}, abstract = {This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Hummen, Ren{\'e} and Gilger, Johannes and Shafagh, Hossein} } @Inproceedings { 2013-hummen-standards, title = {Standards-based End-to-End IP Security for the Internet of Things}, year = {2013}, month = {10}, day = {7}, pages = {1-3}, tags = {iotsec}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-standards.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), G{\"o}ttingen, Germany}, event_place = {G{\"o}ttingen, Germany}, event_name = {PhD Forum of 21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum)}, event_date = {7 Oct. 2013}, language = {en}, ISBN = {978-1-4799-1270-4}, DOI = {10.1109/ICNP.2013.6733648}, reviewed = {1}, author = {Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2013-hummen-slimfit, title = {Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things}, year = {2013}, month = {10}, day = {7}, pages = {259-266}, tags = {iotsec}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-slimfit.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on}, event_place = {Lyon, France}, event_name = {IEEE WiMob 2013 Workshop on the Internet of Things Communications and Technologies (IoT 2013)}, language = {en}, ISBN = {978-1-4577-2014-7}, ISSN = {2160-4886}, DOI = {10.1109/WiMOB.2013.6673370}, reviewed = {1}, author = {Hummen, Ren{\'e} and Hiller, Jens and Henze, Martin and Wehrle, Klaus} } @Inproceedings { 2013-icnp-hummen-tailoring, title = {Tailoring End-to-End IP Security Protocols to the Internet of Things}, year = {2013}, month = {10}, day = {7}, pages = {1-10}, tags = {iotsec}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-hummen-tailoring.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), G{\"o}ttingen, Germany}, event_place = {G{\"o}ttingen, Germany}, event_name = {21st IEEE International Conference on Network Protocols (ICNP 2013)}, event_date = {7-10 Oct. 2013}, language = {en}, ISBN = {978-1-4799-1270-4}, DOI = {10.1109/ICNP.2013.6733571}, reviewed = {1}, author = {Hummen, Ren{\'e} and Wirtz, Hanno and Ziegeldorf, Jan Henrik and Hiller, Jens and Wehrle, Klaus} } @Article { 2013-elsevir-aktas-harnessing-cross-layer-design, title = {Harnessing Cross-Layer Design}, journal = {Elsevir Ad-hoc Networks}, year = {2013}, month = {10}, day = {1}, tags = {crawler}, reviewed = {1}, author = {Aktas, Ismet and Alizai, Muhammad Hamad and Schmidt, Florian and Wirtz, Hanno and Wehrle, Klaus} } @Article { 2013-raza-lithe, title = {Lithe: Lightweight Secure CoAP for the Internet of Things}, journal = {IEEE Sensors Journal}, year = {2013}, month = {10}, volume = {13}, number = {10}, pages = {3711-3720}, keywords = {Internet of Things;operating systems (computers);personal area networks;protocols;security of data;6LoWPAN standard;Contiki operating system;DTLS;Internet of Things;IoT;Lithe;authenticated confidential communication;constrained application protocol;datagram transport layer security;e-health domain;end-to-end security;lightweight secure CoAP;resource-constrained devices;Encoding;Internet;Payloads;Protocols;Security;Sensors;Standards;6LoWPAN;CoAP;CoAPs;DTLS;IoT;security}, tags = {iotsec}, language = {en}, ISSN = {1530-437X}, DOI = {10.1109/JSEN.2013.2277656}, reviewed = {1}, author = {Raza, Shahid and Shafagh, Hossein and Hewage, Kasun and Hummen, Ren{\'e} and Voigt, Thiemo} } @Inproceedings { 2013-wintech-schmidt-senserr, title = {Bit Error Distribution and Mutation Patterns of Corrupted Packets in Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {30}, pages = {49--56}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-schmidt-wintech-errors.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)}, event_date = {30 September 2013}, language = {en}, DOI = {10.1145/2505469.2505475}, reviewed = {1}, author = {Schmidt, Florian and Ceriotti, Matteo and Wehrle, Klaus} } @Inproceedings { 2013-chants-wirtz-heaven, title = {Interest-based Cloud-facilitated Opportunistic Networking}, year = {2013}, month = {9}, day = {30}, pages = {1--8}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-CHANTS-heaven-wirtz.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013)}, event_date = {30 September 2013}, language = {en}, ISBN = {978-1-4503-2363-5}, DOI = {10.1145/2505494.2505504}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Zimmermann, Torsten and Wehrle, Klaus} } @Inproceedings { 2013-wintech-bosling-models, title = {Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {30}, pages = {65--72}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-bosling-wintech-fingerprint.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, USA}, event_place = {Miami, USA}, event_name = {8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013)}, event_date = {30 September 2013}, language = {en}, DOI = {10.1145/2505469.2505477}, reviewed = {1}, author = {Bosling, Marcel and Ceriotti, Matteo and Zimmermann, Torsten and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Techreport { 2013-ceriotti-fgsn-appcentric, title = {Towards Application-Centric Deployment of Low-Power Wireless Networks}, year = {2013}, month = {9}, day = {13}, number = {SEEMOO-TR-2013-0}, number2 = {12. GI/ITG KuVS Fachgespr{\"a}ch ''Drahtlose Sensornetze''}, institution = {TU Cottbus}, type = {Technical Report}, author = {Ceriotti, Matteo and Krylovskiy, Alexandr and Wehrle, Klaus} } @Techreport { 2013-draft-garcia-core-security-06, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {9}, day = {11}, number = {draft-garcia-core-security-06}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-06}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Conference { VTC2013_parruca_gross, title = {Analytical Model of Proportional Fair Scheduling in Interference-limited OFDMA/LTE Networks}, year = {2013}, month = {9}, abstract = {Various system tasks like interference coordination, handover decisions, admission control etc. in upcoming cellular networks require precise mid-term (spanning over a few seconds) performance models. Due to channel-dependent scheduling at the base station, these performance models are not simple to obtain. Furthermore, upcoming cellular systems will be interference-limited, hence, the way interference is modeled is crucial for the accuracy. In this paper we present an analytical model for the SINR distribution of the scheduled subcarriers of an OFDMA system with proportional fair scheduling. The model takes the precise SINR distribution into account. We furthermore refine our model with respect to uniform modulation and coding, as applied in LTE networks. The derived models are validated by means of simulations. In additon, we show that our models are approximate estimators for the performance of rate-based proportional fair scheduling, while they outperform some simpler prediction models from related work significantly.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_VTC_parruca.pdf}, booktitle = {Proceedings of IEE Vehicular Telecommunications Conference (VTC-Fall 2013)}, event_place = {Las Vegas, USA}, event_name = {2013 IEEE 78th Vehicular Technology Conference}, event_date = {2-5, September, 2013}, author = {Parruca, Donald and Grysla, Marius and G{\"o}rtzen, Simon and Gross, James} } @Inproceedings { 2013-smith-extremecom-demo, title = {Demo: Opportunistic Deployment Support for Wireless Sensor Networks}, year = {2013}, month = {8}, day = {24}, pages = {1--2}, note = {won ''coolest demo award''}, url = {fileadmin/papers/2013/2013-smith-extremecom-opportunistic-deployment-support.pdf}, misc = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 5th Extreme Conference on Communication}, event_place = {Thorsmork, Iceland}, event_name = {5th Extreme Conference on Communication}, event_date = {August 24-30, 2013}, language = {en}, ISBN = {978-1-4503-2171-6}, reviewed = {1}, author = {Smith, Paul and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 2013-bitsch-extremecom-oneway, title = {A Global One-Way Control Channel for Opportunistic Networks}, year = {2013}, month = {8}, day = {24}, pages = {1--6}, url = {fileadmin/papers/2013/2013-bitsch-extremecom-oneway.pdf}, misc2 = {Online}, editor = {Hui, Pan and Lindgren, Anders}, publisher = {ACM}, booktitle = {Proceedings of the 5th Extreme Conference on Communication}, event_place = {Thorsmork, Iceland}, event_name = {5th Extreme Conference on Communication}, event_date = {August 24-30, 2013}, language = {en}, ISBN = {978-1-4503-2171-6}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Alhamoud, Alaa and Wehrle, Klaus} } @Techreport { draft-hummen-dtls-extended-session-resumption-00, title = {Extended DTLS Session Resumption for Constrained Network Environments}, year = {2013}, month = {7}, day = {15}, number = {draft-hummen-dtls-extended-session-resumption-00}, abstract = {This draft defines two extensions for the existing session resumption mechanisms of TLS that specifically apply to Datagram TLS (DTLS) in constrained network environments. Session resumption type negotiation enables the client and the server to explicitly agree on the session resumption mechanism for subsequent handshakes, thus avoiding unnecessary overheads occurring with the existing specifications. Session resumption without client-side state additionally enables a constrained DTLS client to resume a session without the need to maintain state while the session is inactive. The extensions defined in this draft update [RFC5077] and [RFC5246].}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-dtls-extended-session-resumption-00}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Hummen, Ren{\'e} and Gilger, Johannes} } @Inproceedings { 2013-wirtz-iot-nc-loops, title = {Opening the Loops - Towards Semantic, Information-centric Networking in the Internet of Things}, year = {2013}, month = {6}, day = {24}, url = {/fileadmin/papers/2013/2013-wirtz-control_loops.pdf}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Workshop on Internet-of-Things Networking and Control 2013 (IoT-NC'13)}, event_place = {New Orleans, USA}, event_name = {IEEE International Workshop on Internet-of-Things Networking and Control 2013 (in conjunction with IEEE SECON'13)}, event_date = {2013-06-24}, language = {en}, ISBN = {978-1-4673-3122-7}, DOI = {10.1109/SAHCN.2013.6644955}, reviewed = {1}, author = {Wirtz, Hanno and Wehrle, Klaus} } @Article { 2013-scn-ziegeldorf-iot-privacy, title = {Privacy in the Internet of Things: Threats and Challenges}, journal = {Security and Communication Networks - Special Issue on 'Security in a Completely Interconnected World'}, year = {2013}, month = {6}, day = {10}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013-ziegeldorf-scn-privacy-in-the-iot.pdf}, misc2 = {Online}, publisher = {Wiley}, language = {en}, DOI = {10.1002/sec.795}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Garcia-Morchon, Oscar and Wehrle, Klaus} } @Conference { 2013-wowmom-punal-RFRA, title = {RFRA: Random Forests Rate Adaptation for Vehicular Networks}, year = {2013}, month = {6}, day = {4}, publisher = {IEEE}, booktitle = {Proceedings of the 14th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'13)}, event_place = {Madrid, Spain}, event_name = {WoWMoM}, event_date = {June, 2013}, state = {accepted}, author = {Pu{\~n}al, Oscar and Zhang, Hanzhi and Gross, James} } @Inproceedings { 2013-sec-routing-switching-maki, title = {A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks}, year = {2013}, month = {6}, day = {4}, booktitle = {Proceedings of the 4th IEEE International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN 2013)}, state = {accepted}, reviewed = {1}, author = {Werner, Marc and Kaiser, J{\"o}rg and Hollick, Matthias and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { 2013-duma-henze-cloud-annotations, title = {The Cloud Needs Cross-Layer Data Handling Annotations (Position Paper)}, year = {2013}, month = {5}, day = {23}, pages = {18-22}, tags = {sensorcloud}, url = {fileadmin/papers/2013/2013-duma-henze-cloudannotations.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), part of 2013 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA}, language = {en}, ISBN = {978-1-4799-0458-7}, DOI = {10.1109/SPW.2013.31}, reviewed = {1}, author = {Henze, Martin and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { Dombrowski2013WiOpt, title = {Energy-Efficient Multi-Hop Transmission for Machine-to-Machine Communications}, year = {2013}, month = {5}, day = {13}, pages = {341-348}, keywords = {energy minimization;quality-of-service;outage probability;deadline;optimization;multi-hop;average csi;instantaneous csi}, booktitle = {11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2013)}, event_place = {Tsukuba Science City, Japan}, language = {English}, reviewed = {1}, author = {Dombrowski, Christian and Petreska, Neda and G{\"o}rtzen, Simon and Schmeink, Anke and Gross, James} } @Inproceedings { 2013-hummen-towards, title = {Towards Viable Certificate-based Authentication for the Web of Things}, year = {2013}, month = {4}, day = {19}, tags = {iotsec}, url = {fileadmin/papers/2013/2013-hummen-towards.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec '13)}, event_place = {Budapest, Hungary}, event_name = {2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy}, language = {en}, ISBN = {978-1-4503-2003-0}, DOI = {10.1145/2463183.2463193}, reviewed = {1}, author = {Hummen, Ren{\'e} and Ziegeldorf, Jan Henrik and Shafagh, Hossein and Raza, Shahid and Wehrle, Klaus} } @Inproceedings { 2013-hummen-6lowpan, title = {6LoWPAN Fragmentation Attacks and Mitigation Mechanisms}, year = {2013}, month = {4}, day = {17}, tags = {iotsec; sensorcloud}, url = {fileadmin/papers/2013/2013-hummen-6lowpan.pdf}, publisher = {ACM}, booktitle = {Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)}, event_place = {Budapest, Hungary}, event_name = {6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13)}, language = {en}, ISBN = {978-1-4503-1998-0}, DOI = {10.1145/2462096.2462107}, reviewed = {1}, author = {Hummen, Ren{\'e} and Hiller, Jens and Wirtz, Hanno and Henze, Martin and Shafagh, Hossein and Wehrle, Klaus} } @Inproceedings { 2013-EW-Weyres-Interference, title = {Effective Service Capacity Analysis of Interference-Limited Multi-Carrier Wireless Systems}, journal = {19th European Wireless Conference}, year = {2013}, month = {4}, pages = {1--7}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6582799}, publisher = {VDE-Verlag}, booktitle = {19th European Wireless Conference (EW 2013)}, ISBN = {978-3-8007-3498-6}, DOI = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6582799}, reviewed = {1}, author = {Weyres, Marco and Gross, James} } @Inproceedings { 2013-wisec-garcia-securing, title = {Securing the IP-based Internet of Things with HIP and DTLS}, year = {2013}, month = {4}, pages = {119--124}, publisher = {ACM}, booktitle = {Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13) (short paper)}, ISBN = {978-1-4503-1998-0}, DOI = {10.1145/2462096.2462117}, reviewed = {1}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Moreno-Sanchez, Pedro and Vidal-Meca, Francisco and Ziegeldorf, Jan Henrik} } @Inproceedings { 2013-pitsac-vidalmeca-hip, title = {HIP security architecture for the IP-based Internet of Things}, year = {2013}, month = {3}, day = {25}, pages = {1331 - 1336}, abstract = {The IP-based Internet of Things refers to the pervasive interactions of smart objects and people enabling new applications by means of IP protocols. An application scenario is a Smart City in which the city infrastructure, cars, and people exchange information to enable new services. IP protocols, such as IPv6, TCP and HTTP will be further complemented by IPv6 over Low powerWireless Personal Area Networks and Constrained Application Protocol currently in development in IETF. Security and privacy are a must for the IP-based IoTs in order to ensure its acceptance. However, mobility, limited bandwidth, and resource-constrained devices pose new challenges and require for a sound and efficient security architecture. In particular, dynamic association of mobile smart objects and the management of keys in large-scale networks remain an open challenge. In this context, we propose a flexible security architecture based on the Host Identity Protocol and Multimedia Internet KEYing protocols allowing for secure network association and key management. HIP - based on asymmetric-key cryptography - ensures unambiguous thing identification, mobility support, as well as a lightweight and secure method for network association. In our solution, HIP is extended with MIKEY capabilities to provide enhanced key management using polynomials, which allow to generate pairwise keys with any node based on its identity. This combination of protocols and crypto-algorithms ensures both strong security and very good performance as shown by our implementation and presents clear advantages compared with other alternatives.}, keywords = {Internet of Things; Security; Network Access; Key Management}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2013}, event_place = {Barcelona, Spain}, event_date = {25.-28.03.2013}, language = {en}, DOI = {10.1109/WAINA.2013.158}, reviewed = {1}, author = {Vidal Meca, Francisco and Ziegeldorf, Jan Henrik and Garcia-Morchon, Oscar and Kumar, Sandeep S. and Keoh, Sye Loong and Moreno-Sanchez, Pedro} } @Inproceedings { 2013-schmidt-wons-rtp, title = {A Heuristic Header Error Recovery Scheme for RTP}, year = {2013}, month = {3}, day = {19}, pages = {186--190}, tags = {refector}, url = {fileadmin/papers/2013/2013-schmidt-wons-rtp-refector.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13), Banff, Canada}, event_place = {Banff, Canada}, event_name = {10th International Conference on Wireless On-demand Network Systems and Services (WONS'13)}, event_date = {17-20 March 2013}, language = {en}, ISBN = {978-1-4799-0747-2}, DOI = {10.1109/WONS.2013.6578345}, reviewed = {1}, author = {Schmidt, Florian and Orlea, David and Wehrle, Klaus} } @Article { 2013-fernandez-ceriotti-bitsch-and-then-the-weekend-jsan, title = {“And Then, the Weekend Started”: Story of a WSN Deployment on a Construction Site}, journal = {Journal of Sensor and Actuator Networks}, year = {2013}, month = {3}, day = {11}, volume = {2}, number = {1}, pages = {156--171}, abstract = {Wireless Sensor Networks (WSNs) are versatile monitoring systems that can provide a large amount of real-time data in scenarios where wired infrastructures are inapplicable or expensive. This technology is expected to be handled by domain experts, who perceive a WSN as a (promised to be) easy to deploy black box. This work presents the deployment experience of a WSN, as conducted by domain experts, in a ground improvement area. Building upon off-the-shelf solutions, a fuel cell powered gateway and 21 sensor devices measuring acceleration, inclination, temperature and barometric pressure were installed to monitor ground subsidence. We report about how poor GSM service, malfunctioning hardware, unknown communication patterns and obscure proprietary software required in-field ad-hoc solutions. Through the lessons learned, we look forward to investigating how to make the deployment of these systems an easier task.}, keywords = {sensor network deployment; experiences; in-field debugging}, web_url = {http://www.mdpi.com/2224-2708/2/1/156}, misc2 = {Online}, language = {en}, ISSN = {2224-2708}, DOI = {10.3390/jsan2010156}, reviewed = {1}, author = {Fern{\'a}ndez-Steeger, Tom{\'a}s and Ceriotti, Matteo and Bitsch Link, J{\'o} Agila and May, Matthias and Hentschel, Klaus and Wehrle, Klaus} } @Techreport { 2013-draft-garcia-core-security-05, title = {Security Considerations in the IP-based Internet of Things}, year = {2013}, month = {3}, day = {11}, number = {draft-garcia-core-security-05}, abstract = {A direct interpretation of the Internet of Things concept refers to the usage of standard Internet protocols to allow for human-to-thing or thing-to-thing communication. Although the security needs are well-recognized, it is still not fully clear how existing IP-based security protocols can be applied to this new setting. This Internet-Draft first provides an overview of security architecture, its deployment model and general security needs in the context of the lifecycle of a thing. Then, it presents challenges and requirements for the successful roll-out of new applications and usage of standard IP-based security protocols when applied to get a functional Internet of Things.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-garcia-core-security-05}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Garcia-Morchon, Oscar and Keoh, Sye Loong and Kumar, Sandeep S. and Hummen, Ren{\'e} and Struik, Ren{\'e}} } @Inproceedings { 2013-wons-wirtz-fuzzy, title = {Fuzzy Logical Coordinates and Location Services for Scalable Addressing in Wireless Networks}, year = {2013}, month = {3}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS '13), Banff, Canada}, event_place = {Banff, Canada}, language = {en}, ISBN = {978-1-4799-0747-2}, DOI = {10.1109/WONS.2013.6578338}, reviewed = {1}, author = {Wirtz, Hanno and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Proceedings { parruca_gross_2013, title = {Rate selection analysis under semi-persistent scheduling in LTE networks}, year = {2013}, month = {1}, day = {25}, pages = {1184,1190}, abstract = {Upcoming LTE networks have basically two different modes for scheduling data in the down-link by the base station. Dynamic scheduling brings the advantage of exploiting instantaneous channel state information while it puts on the other hand a significant burden on the system in terms of overhead and computation requirements. Especially for small packets that show up periodically, the overhead is typically too high. Therefore, the base station can serve such packet flows by the semi-persistent scheduling mode. In this mode, a certain resource allocation is fixed to a periodic schedule. While this does not allow any longer to exploit instantaneous channel states, it requires much less overhead. In this paper, we address the problem of selecting a modulation and coding scheme for such semi-persistent scheduling grants. The problem lies here in the stochastic characterization of the resource blocks over the next few seconds while on the other hand estimating based on such a characterization the blok error rate (and hence the average goodput). We provide a novel scheme, which outperforms all previously presented schemes significantly. The underlying model that we provide can also be used for any other long-term decision in an LTE system with semi-persistent scheduling such as interference coordination, handover decision etc.}, keywords = {Long Term Evolution;decision making;dynamic scheduling;error statistics;modulation;radio links;resource allocation;stochastic processes;wireless channels;LTE networks;base station;blok error rate;data scheduling;down-link;dynamic scheduling;instantaneous channel state information;long-term decision;modulation selection;packet flows;periodic scheduling;rate selection analysis;resource allocation;resource blocks;semi-persistent scheduling mode;stochastic characterization}, url = {www.performance.rwth-aachen.de/publications/conferences/2013ICNC_parruca.pdf}, web_url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=6504261}, event_place = {San Diego, USA}, event_name = {International Conference on Computing, Networking and Communications (ICNC) 2013}, event_date = {28-31 January 2013}, language = {English}, ISBN = {978-1-4673-5287-1}, DOI = {10.1109/ICCNC.2013.6504261}, author = {Parruca, Donald and Gross, James} } @Inproceedings { 2013-ccnc-lora-gossipmule, title = {Gossipmule: Improving Association Decisions via Opportunistic Recommendations}, year = {2013}, month = {1}, day = {11}, booktitle = {Proceedings of the 1st Workshop on People Centric Sensing and Communications}, state = {accepted}, reviewed = {1}, author = {Lora Gir{\'o}n, M{\'o}nica Alejandra and Paulus, Alexander and Wehrle, Klaus} } @Techreport { 2013-draft-hummen-hip-middle-puzzle-01, title = {HIP Middlebox Puzzle Offloading and End-host Notification}, year = {2013}, month = {1}, day = {9}, number = {draft-hummen-hip-middle-puzzle-01}, abstract = {The Host Identity Protocol [RFC5201] is a secure signaling protocol with a cryptographic namespace. It provides the communicating peers with a cryptographic puzzle mechanism to protect against Denial of Service (DoS) attacks exploiting the computation and memory overheads of the protocol exchange. This document specifies an extension of the protocol that enables an on-path network entity to assist in the choice of the puzzle difficulty in case of an attack. Furthermore, it defines a modification of the puzzle mechanism that enables a host to delegate puzzle solving to an on-path network entity.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-hummen-hip-middle-puzzle-01}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Hummen, Ren{\'e} and Henze, Martin and Hiller, Jens} } @Inproceedings { 2013-ccncdemo-lora-gossipmule, title = {Demo: Improving Associations in IEEE 802.11 WLANs}, year = {2013}, month = {1}, booktitle = {Proceedings of the 10th IEEE Consumer Communications \& Networking Conference, CCNC}, event_place = {Las Vegas, Nevada, USA}, event_name = {CCNC 2013 Demonstration Track}, state = {accepted}, author = {Lora Gir{\'o}n, M{\'o}nica Alejandra and Paulus, Alexander and Wehrle, Klaus} } @Article { 2013-pik-hiller-e2e-security-smart, title = {End-to-End Security for Internet-Connected Smart Objects}, journal = {Praxis der Informationsverarbeitung und Kommunikation}, year = {2013}, volume = {36}, number = {1}, pages = {23-29}, language = {en}, ISSN = {1865-8342}, DOI = {10.1515/pik-2012-0141}, author = {Hiller, Jens} } @Article { 2013-JIT-Jakobs, title = {Why Then Did the X.400 E-mail Standard Fail? Reasons and Lessons to be Learned.}, journal = {Journal of Information Technology}, year = {2013}, volume = {28}, number = {2}, url = {fileadmin/papers/2013/2013-JIT-Jakobs.pdf}, author = {Jakobs, Kai} } @Article { 2013-wirtz-alizai-tinywifi-jnca, title = {Portable Wireless-Networking Protocol Evaluation}, journal = {Journal of Network and Computer Applications (JNCA)}, year = {2013}, note = {Co-primary authorship Alizai, Wirtz fileadmin/papers/2013/2013-wirtz-alizai-tinywifi-jnca.pdf}, web_url = {http://www.sciencedirect.com/science/article/pii/S108480451300060X}, language = {en}, ISSN = {1084-8045}, DOI = {10.1016/j.jnca.2013.02.022}, reviewed = {1}, author = {Wirtz, Hanno and Alizai, Muhammad Hamad and Kirchen, Bernhard and Wehrle, Klaus} } @Book { 2013-Jakobs-SIIT, title = {Proceedings 8th IEEE Conf. on Standardisation \& Innovation in Information Technology}, year = {2013}, editor = {Kai Jakobs}, publisher = {IEEE}, reviewed = {1}, author = {Jakobs, Kai} } @Book { 2013_Jakobs_EURAS, title = {Boosting European Competitiveness. Proceedings of the 18th EURAS Conference. EURAS contributions to standardisation research, vol. 7.}, year = {2013}, editor = {Kai Jakobs et al.}, publisher = {Mainz Academic Publishers}, author = {Jakobs, Kai} } @Inbook { 2013-book-weingaertner-benchmarking-p2p, title = {Benchmarking Peer-to-Peer Systems Understanding Quality of Service in Large-Scale Distributed Systems}, year = {2013}, volume = {7847}, pages = {69-79}, web_url = {http://link.springer.com/chapter/10.1007/978-3-642-38673-2_5}, web_url_date = {2016-11-11}, misc2 = {Print}, editor = {Effelsberg, Wolfgang and Steinmetz, Ralf and Strufe, Thorsten}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, chapter = {Content Delivery Overlays}, language = {EN}, ISBN = {978-3-642-38672-5}, DOI = {10.1007/978-3-642-38673-2_5}, author = {Weingaertner, Elias and Glebke, Ren{\'e} and Hocks, Alexander} } @Conference { EW2013_parruca_gross, title = {On Semi-Static Interference Coordination under Proportional Fair Scheduling in LTE Systems}, year = {2013}, pages = {8}, abstract = {In this paper we consider the design of semi-static inter-cell interference coordination schemes for LTE networks. In this approach, base stations coordinate the power settings per resource block over long time spans such as seconds. In order to optimize the power settings, one needs to employ models which predict the rate of terminals over the next coordination period under the usage of a given power setting. However, these models are typically quite simple and neglect the impact from fading as well as from dynamic resource allocation performed at the base stations on a millisecond basis. Ignoring such properties of OFDMA networks leads therefore to suboptimal transmit power settings. In this paper, we study the impact from a precise rate prediction model that accurately accounts for fading and dynamic resource allocation. On the down-side, this more precise model leads to a much more involved optimization problem to be solved once per coordination period. We propose two different heuristic methods to deal with this problem. Especially the usage of genetic algorithm results to be promising to counteract the complexity increase. We then study the overall system performance and find precise rate prediction models to be essential for semi-static interference coordination as they provide significant performance improvements in comparison to approaches with simpler models.}, keywords = {ICIC, proportional fair scheduling, power mask, resource block, scheduling, dynamic scheduling, inter cell interference coordination, LTE, OFDMA, WiMAX}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2013/2013_ICIC_parruca_grysla_gross.pdf}, web_url = {http://www.vde-verlag.de/proceedings-en/563498043.html}, editor = {vde-verlag}, publisher = {vde-verlag}, address = {http://www.vde-verlag.de/}, booktitle = {Proceedings: European Wireless 2013}, event_place = {Guildford, UK}, event_name = {2013 - 19th European Wireless Conference}, event_date = {04/16/2012 - 04/18/2013}, language = {English}, author = {Parruca, Donald and Grysla, Marius and M{\"a}h{\"o}nen, Petri and Petrova, Marina and Zhou, Han and Naghibi, Farshad and Gross, James} } @Inproceedings { Mobileoffloading_2013, title = {Mobile Adhoc Offloading in Wireless Ad hoc Network}, year = {2013}, url = {http://arxiv.org/abs/1401.4528}, booktitle = {Proc. of MANIAC 2013: Mobile Offloading competition}, event_name = {MANIAC 2013}, event_date = {Berlin, Germany}, author = {Li, Di and Mitseva, Asya} } @Inproceedings { 2013_Jakobs_SIIT1, title = {How to Perceive the (Future) Role of China in ICT Standardisation – A European Perspective. Proc. 8th Int. Conf. on Standardisation \& Innovation in Information Technology}, year = {2013}, url = {fileadmin/papers/2013/2013_Jakobs_SIIT1.pdf}, booktitle = {Proc. 8th Int. Conf. on Standardisation \& Innovation in Information Technology}, reviewed = {1}, author = {Jakobs, Kai and Gerst, Martina} } @Inproceedings { 2013_Jakobs_SIIT2, title = {Success in ICT Standards Setting – A Closer Look at Some Influencing Factors}, year = {2013}, url = {fileadmin/papers/2013/2013_Jakobs_SIIT2.pdf}, booktitle = {Proc. 8th Int. Conf. on Standardisation \& Innovation in Information Technology.}, reviewed = {1}, author = {Jakobs, Kai} } @Inproceedings { 2013_Jakobs_EURAS1, title = {Strategic positioning in ICT Standardisation.}, year = {2013}, url = {fileadmin/papers/2013/2013_Jakobs_EURAS1.pdf}, booktitle = {Proceedings of the 18th EURAS Conference. EURAS contributions to standardisation research, vol. 7.}, reviewed = {1}, author = {Jakobs, Kai} } @Inproceedings { 2013_Jakobs_Seoul, title = {Looking East – How Does Europe Perceive the (Future) Role of China in ICT Standardisation}, year = {2013}, url = {fileadmin/papers/2013/2013_Jakobs_Seoul.pdf}, booktitle = {Proceedings Workshop ‘A New Wave in Global Standardization from Asia’}, reviewed = {1}, author = {Jakobs, Kai} } @Phdthesis { 2013-kunz-phdthesis, title = {Exploiting Multi-core Systems for Parallel Network Simulation}, year = {2013}, school = {RWTH Aachen University}, author = {Kunz, Georg} } @Phdthesis { 2013-sasnaukas-phdthesis, title = {Symbolic Execution of Distributed Systems}, year = {2013}, school = {RWTH Aachen University}, author = {Sasnaukas, Raimondas} } @Phdthesis { 2013-weingaertner-phdthesis, title = {Synchronized Performance Evaluation Methodologies for Communication Systems}, year = {2013}, school = {RWTH Aachen University}, author = {Weing{\"a}rtner, Elias} }