This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-07-03 Creation time: 17-35-41 --- Number of references 4 conference 2008-heer-pisa-full Secure Wi-Fi Sharing at Global Scales 2008 6 16 1 1-7 The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet uplinks among users has first become popular in communities of individuals and has recently been adopted as a business model by several companies. However, existing implementations and proposals suffer from the security risks of directly providing Internet access to strangers. In this paper, we present the P2P Wi-Fi Internet Sharing Architecture PISA, which eliminates these risks by introducing secure tunneling, cryptographic identities, and certificates as primary security concepts. Thus, PISA offers nomadic users the same security that they expect from a wired Internet connection at home. Based on its three fundamental mechanisms, PISA achieves a flexibility which opens significant advantages over existing systems. They include user mobility, anonymity, service levels with different performance and availability characteristics, and different revenue models for operators. With this combination of key features, PISA forms an essential basis for global, seamless, and secure Wi-Fi sharing for large communities. mobile_access http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-ict-secure-wifi.pdf Print IEEE
Washington, DC, USA
Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation St. Petersburg, Russian Federation 15th International Conference on Telecommunication (ICT) 16-19 June 2008 en 978-1-4244-2035-3 1 TobiasHeer StefanGötz EliasWeingaertner KlausWehrle
inproceedings 200809WeingaertnerSyncNetworkEmulation Synchronized Network Emulation 2008 6 3 1 1 1-2 Awarded with ACM SIGMETRICS Best Student Panelist Award. The corresponding Abstract was included on the USB Stick of the 2007 SIGMETRICS conference. https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/sigmetrics-thesis-panel.pdf Online
Annapolis, MD
Proceedings of the ACM SIGMETRICS 2008 Student Thesis Panel, Annapolis, MD ACM en 1 EliasWeingaertner
article 200808WeingaertnerSIGMETRICSPERSyncNetWorkEmulation Synchronized network emulation: matching prototypes with complex simulations SIGMETRICS Performance Evaluation Review 2008 36 2 58-63 Network emulation, in which real systems interact with a network simulation, is a common evaluation method in computer networking research. Until now, the simulation in charge of representing the network has been required to be real-time capable, as otherwise a time drift between the simulation and the real network devices may occur and corrupt the results. In this paper, we present our work on synchronized network emulation. By adding a central synchronization entity and by virtualizing real systems for means of control, we can build-up network emulations which contain both unmodified x86 systems and network simulations of any complexity. This is a revised version of a paper originally presented at the ACM HotMetrics 2008 workshop. print en 0163-5999 10.1145/1453175.1453185 1 EliasWeingaertner FlorianSchmidt TobiasHeer KlausWehrle techreport 200807VOMLEHNAIB200816NetworkSimulatorComparison Comparing recent network simulators: A performance evaluation study Aachener Informatik Berichte 2008 2008-16 AIB 2008-16 1-28 Ranging from the development of new protocols to validating analytical performance metrics, network simulation is the most prevalent methodology in the field of computer network research. While the well known ns-2 toolkit has established itself as the quasi standard for network simulation, the successors are on their way. In this paper, we first survey recent contributions in the field of network simulation tools as well as related aspects such as parallel network simulation. Moreover, we present preliminary results which compare the resource demands for ns-3, JiST, SimPy and OMNeT++ by implementing the identical simulation scenario in all these network simulation tools. https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/AIB-2008-16.pdf Online
Ahornstr. 55, Aachen, Germany
RWTH Aachen University Technical Report 0935-3232 Hendrikvom Lehn EliasWeingaertner KlausWehrle