% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-07-03 % Creation time: 17-23-19 % --- Number of references % 4 % @Conference { 2008-heer-pisa-full, title = {Secure Wi-Fi Sharing at Global Scales}, year = {2008}, month = {6}, day = {16}, volume = {1}, pages = {1-7}, abstract = {The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet uplinks among users has first become popular in communities of individuals and has recently been adopted as a business model by several companies. However, existing implementations and proposals suffer from the security risks of directly providing Internet access to strangers. In this paper, we present the P2P Wi-Fi Internet Sharing Architecture PISA, which eliminates these risks by introducing secure tunneling, cryptographic identities, and certificates as primary security concepts. Thus, PISA offers nomadic users the same security that they expect from a wired Internet connection at home. Based on its three fundamental mechanisms, PISA achieves a flexibility which opens significant advantages over existing systems. They include user mobility, anonymity, service levels with different performance and availability characteristics, and different revenue models for operators. With this combination of key features, PISA forms an essential basis for global, seamless, and secure Wi-Fi sharing for large communities.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-ict-secure-wifi.pdf}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, booktitle = {Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation}, event_place = {St. Petersburg, Russian Federation}, event_name = {15th International Conference on Telecommunication (ICT)}, event_date = {16-19 June 2008}, language = {en}, ISBN = {978-1-4244-2035-3}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { 200809WeingaertnerSyncNetworkEmulation, title = {Synchronized Network Emulation}, year = {2008}, month = {6}, day = {3}, volume = {1}, number = {1}, pages = {1-2}, note = {Awarded with ACM SIGMETRICS Best Student Panelist Award. The corresponding Abstract was included on the USB Stick of the 2007 SIGMETRICS conference.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/sigmetrics-thesis-panel.pdf}, misc2 = {Online}, address = {Annapolis, MD}, booktitle = {Proceedings of the ACM SIGMETRICS 2008 Student Thesis Panel, Annapolis, MD}, organization = {ACM}, language = {en}, reviewed = {1}, author = {Weingaertner, Elias} } @Article { 200808WeingaertnerSIGMETRICSPERSyncNetWorkEmulation, title = {Synchronized network emulation: matching prototypes with complex simulations}, journal = {SIGMETRICS Performance Evaluation Review}, year = {2008}, volume = {36}, number = {2}, pages = {58-63}, abstract = {Network emulation, in which real systems interact with a network simulation, is a common evaluation method in computer networking research. Until now, the simulation in charge of representing the network has been required to be real-time capable, as otherwise a time drift between the simulation and the real network devices may occur and corrupt the results. In this paper, we present our work on synchronized network emulation. By adding a central synchronization entity and by virtualizing real systems for means of control, we can build-up network emulations which contain both unmodified x86 systems and network simulations of any complexity.}, note = {This is a revised version of a paper originally presented at the ACM HotMetrics 2008 workshop.}, misc2 = {print}, language = {en}, ISSN = {0163-5999}, DOI = {10.1145/1453175.1453185}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and Heer, Tobias and Wehrle, Klaus} } @Techreport { 200807VOMLEHNAIB200816NetworkSimulatorComparison, title = {Comparing recent network simulators: A performance evaluation study}, journal = {Aachener Informatik Berichte}, year = {2008}, volume = {2008-16}, number = {AIB 2008-16}, pages = {1-28}, abstract = {Ranging from the development of new protocols to validating analytical performance metrics, network simulation is the most prevalent methodology in the field of computer network research. While the well known ns-2 toolkit has established itself as the quasi standard for network simulation, the successors are on their way. In this paper, we first survey recent contributions in the field of network simulation tools as well as related aspects such as parallel network simulation. Moreover, we present preliminary results which compare the resource demands for ns-3, JiST, SimPy and OMNeT++ by implementing the identical simulation scenario in all these network simulation tools.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/AIB-2008-16.pdf}, misc2 = {Online}, address = {Ahornstr. 55, Aachen, Germany}, institution = {RWTH Aachen University}, type = {Technical Report}, ISSN = {0935-3232}, author = {vom Lehn, Hendrik and Weingaertner, Elias and Wehrle, Klaus} }