% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-07-04 % Creation time: 15-21-30 % --- Number of references % 12 % @Inproceedings { 2011-wirtz-kaleidoscope, title = {Cooperative Wi-Fi-Sharing: Encouraging Fair Play}, year = {2011}, month = {12}, day = {14}, tags = {mobile_access}, url = {fileadmin/papers/2011/2011-wirtz-kaleidoscope.pdf}, misc = {Online}, address = {ITU}, booktitle = {Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa}, event_place = {Cape Town, South Africa}, event_name = {ITU-T Kaleidoscope: The fully networked human?}, event_date = {2011-12-12}, language = {en}, ISBN = {978-92-61-13651-2}, reviewed = {1}, author = {Wirtz, Hanno and Hummen, Ren{\'e} and Viol, Nicolai and Heer, Tobias and Lora Gir{\'o}n, M{\'o}nica Alejandra and Wehrle, Klaus} } @Inproceedings { Varj1112:Secure, title = {Secure Resolution of {End-Host} Identifiers for Mobile Clients}, year = {2011}, month = {12}, day = {5}, abstract = {Many efforts of the network research community focus on the introduction ofa new identifier to relieve the IP address from its dual role of end-hostidentifier and routable locator. This identifier-locator split introduces anew identifier between human readable domain names and routable IPaddresses. Mapping between identifiers and locators requires additionalname mapping mechanisms because their relation is not trivial. Despite itspopularity and efficiency, the DNS system is not a perfect choice forperforming this mapping because identifiers are not hierarchicallystructured and mappings are frequently updated by users. In this paper wediscuss the features needed to resolve flat identifiers to locators in asecure manner. In particular, we focus on the features and the performancethat identifier-locator split protocols require from a mapping system. Tothis end, we consider a mapping system for an identifier-locator splitbased mobility solution and evaluate its performance. IndexTerms—Identifier-locator split, Name resolution, Host Identity Protocol,Security, DNS, DHT, OpenDHT}, keywords = {DHT; DNS; Host Identity Protocol; Security; Identifier-locator split; Nameresolution}, url = {fileadmin/papers/2011/2011-varjonen-secure.pdf}, misc2 = {Online}, publisher = {IEEE}, address = {Piscataway, NJ, USA}, booktitle = {IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Awarded the NGN Best Paper Award}, state = {accepted}, language = {en}, ISBN = {978-1-4244-9268-8}, ISSN = {1930-529X}, reviewed = {1}, author = {Varjonen, Samu and Heer, Tobias and Rimey, Kenneth and Gurtov, Andrei} } @Article { 2011-heer-iot-journal, title = {Security Challenges in the IP-based Internet of Things}, journal = {Springer Wireless Personal Communications Journal}, year = {2011}, month = {10}, volume = {61}, number = {3}, pages = {527-542}, abstract = {A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.}, tags = {iotsec}, url = {fileadmin/papers/2011/2011-heer-iot-challenges.pdf}, misc2 = {Online}, publisher = {Springer}, address = {Netherlands}, language = {en}, ISSN = {0929-6212}, DOI = {10.1007/s11277-011-0385-5}, reviewed = {1}, author = {Heer, Tobias and Garcia-Morchon, Oscar and Hummen, Ren{\'e} and Keoh, Sye Loong and Kumar, Sandeep S. and Wehrle, Klaus} } @Inproceedings { 2011-wirtz-chants, title = {Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode}, year = {2011}, month = {9}, day = {23}, url = {fileadmin/papers/2011/2011-wirtz-chants.pdf}, misc = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the ACM MobiCom Workshop on Challenged Networks (Chants 2011), Las Vegas, NV, USA}, event_place = {Las Vegas, NV, USA}, event_name = {ACM MobiCom Workshop on Challenged Networks (Chants 2011)}, event_date = {2011-09-23}, language = {en}, ISBN = {978-1-4503-0870-0}, DOI = {10.1145/2030652.2030666}, reviewed = {1}, author = {Wirtz, Hanno and Heer, Tobias and Backhaus, Robert and Wehrle, Klaus} } @Inproceedings { 2011-hummen-pisa-demo, title = {PISA-SA - Security and Mobility in a Collaborative Muni-Fi (Demo Abstract)}, year = {2011}, month = {6}, day = {15}, volume = {15}, pages = {35--36}, tags = {mobile_access}, url = {fileadmin/papers/2011/2011-hummen-wisec-pisa-sa-demo.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the fourth ACM Conference on Wireless Network Security, Hamburg, Germany}, event_place = {Hamburg, Germany}, event_name = {Wireless Network Security 2011 (WiSec 2011)}, language = {en}, ISSN = {1559-1662}, DOI = {10.1145/2073290.2073297}, reviewed = {1}, author = {Hummen, Ren{\'e} and Wirtz, Hanno and Viol, Nicolai and Heer, Tobias and Wehrle, Klaus} } @Techreport { rfc6253, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {5}, number = {rfc6253}, abstract = {The Certificate (CERT) parameter is a container for digital certificates. It is used for carrying these certificates in Host Identity Protocol (HIP) control packets. This document specifies the CERT parameter and the error signaling in case of a failed verification. Additionally, this document specifies the representations of Host Identity Tags in X.509 version 3 (v3) and Simple Public Key Infrastructure (SPKI) certificates. The concrete use of certificates, including how certificates are obtained, requested, and which actions are taken upon successful or failed verification, is specific to the scenario in which the certificates are used. Hence, the definition of these scenario- specific aspects is left to the documents that use the CERT parameter.}, tags = {mobile_access}, url = {http://www.ietf.org/rfc/rfc6253.txt}, publisher = {IETF}, howpublished = {RFC 6253 (Experimental)}, series = {Request for Comments}, organization = {Internet Engineering Task Force}, institution = {Internet Engineering Task Force}, type = {Request For Commments (Experimental Standard)}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Inproceedings { 2011-nsdi-slicetime-weingaertner, title = {SliceTime: A platform for scalable and accurate network emulation}, year = {2011}, month = {3}, day = {30}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-weingaertner-nsdi-slicetime-camera_ready_14P.pdf}, misc2 = {Online}, publisher = {USENIX}, address = {Berkeley, CA, USA}, booktitle = {Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11), Boston, MA, USA}, event_place = {Boston, Massachusetts}, language = {en}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and vom Lehn, Hendrik and Heer, Tobias and Wehrle, Klaus} } @Techreport { rfc5201-bis-04, title = {{Host Identity Protocol Version 2}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-rfc5201-bis-04.txt}, note = {{expires: July 24, 2011 (work in progress)}}, tags = {mobile_access}, url = {http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-04}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Moskowitz, Robert and Jokela, Petri and Henderson, Thomas R. and Heer, Tobias} } @Techreport { draft-ietf-hip-cert-08, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-cert-08.txt}, note = {{expires: July 22, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-08}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-08}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Techreport { draft-ietf-hip-cert-07, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-cert-07.txt}, note = {{expires: July 16, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-07}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-07}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Techreport { draft-ietf-hip-cert-09, title = {{Host Identity Protocol Certificates}}, year = {2011}, month = {1}, volume = {1}, number = {draft-ietf-hip-cert-09.txt}, pages = {1}, note = {{expires: July 22, 2011 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-09}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-09}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Techreport { 2011-heer-draft-middle-auth, title = {End-Host Authentication for HIP Middleboxes (Version 4)}, year = {2011}, number = {draft-heer-hip-middle-auth-04}, abstract = {The Host Identity Protocol [RFC5201] is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension allows middleboxes to verify the liveness and freshness of a HIP association and, thus, to secure access control in middleboxes.}, note = {Work in progress}, tags = {ietf, mobile_access}, url = {http://tools.ietf.org/html/draft-heer-hip-middle-auth-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Heer, Tobias and Komu, Miika and Hummen, Ren{\'e} and Wehrle, Klaus} }