Technische Universitat Clausthal

Displaying 1-40 of 59 results

  • White Papers // Sep 2013

    Anonymity-Preserving Public-Key Encryption: A Constructive Approach

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as did multi-casting one message to a receiver population containing the intended receiver. While anonymity and confidentiality appear to be...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2013

    Optimal Parameters for XMSS

    The authors introduce Multi Tree XMSS (XMSSMT), a hash-based signature scheme that can be used to sign a virtually unlimited number of messages. It is provably forward and hence EU-CMA secure in the standard model and improves key and signature generation times compared to previous schemes. XMSSMT has - like...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2013

    More Efficient Oblivious Transfer and Extensions for Faster Secure Computation

    Protocols for secure computation enable parties to compute a joint function on their private inputs without revealing anything but the result. A foundation for secure computation is Oblivious Transfer (OT), which traditionally requires expensive public key cryptography. A more efficient way to perform many OTs is to extend a small...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2013

    The Potential of an Individualized Set of Trusted CAs: Defending Against CA Failures in the Web PKI

    The security of most Internet applications relies on underlying Public Key Infrastructures (PKIs) and thus on an ecosystem of Certification Authorities (CAs). The pool of PKIs responsible for the issuance and the maintenance of SSL certificates, called the Web PKI, have grown extremely large and complex. Herein, each CA is...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2013

    Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution Over the Integers

    Several lattice-based cryptosystems require to sample from a discrete gaussian distribution over the integers. Existing methods to sample from such a distribution either need large amounts of memory or they are very slow. In this paper the authors explore a different method that allows for a flexible time-memory trade-off, offering...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes

    Multivariate cryptography is one of the main candidates to guarantee the security of communication in the post-quantum era. Especially in the area of digital signatures, multivariate cryptography offers a wide range of practical schemes. In Petzoldt et al. showed a way to speed up the verification process of improved variants...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Allowing Early Inspection of Activity Data From a Highly Distributed Bodynet With a Hierarchical-Clustering-of-Segments Approach

    The output delivered by body-wide inertial sensing systems has proven to contain sufficient information to distinguish between a large numbers of complex physical activities. The bottlenecks in these systems are in particular the parts of such systems that calculate and select features, as the high dimensionality of the raw sensor...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Forward Secure Signatures on Smart Cards

    The authors presented the first smart card implementation of a forward secure signature scheme. The results presented in section 4 shows that the implementation is practical and that key generation can be done on the card in less than a minute. This is in contrast to previous implementations of similar...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Improvement and Efficient Implementation of a Lattice-based Signature Scheme

    Lattice-based signature schemes constitute an interesting alternative to RSA and discrete logarithm based systems which may become insecure in the future, for example due to the possibility of quantum attacks. A particularly interesting scheme in this context is the GPV signature scheme [GPV08] combined with the trapdoor construction from Micciancio...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2013

    W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes

    Digital signatures are among the most important cryptographic primitives in practice. They have many applications, including the use in SSL/TLS and securing software updates. Hash-based or Merkle Signature Schemes (MSS) are an interesting alternative to the signature schemes used today, not only because they are assumed to resist quantum computer...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2013

    Automatic Protocol Selection in Secure Two-Party Computations

    Performance of secure computation is still often an obstacle to its practical adoption. There are different protocols for secure computation that compete for the best performance. In this paper the authors propose automatic protocol selection which selects a protocol for each operation resulting in a mix with the best performance...

    Provided By Technische Universitat Clausthal

  • White Papers // Jan 2013

    Towards a Trust Management System for Cloud Computing Marketplaces: Using CAIQ as a Trust Information Source

    Cloud computing enables IT related services in a more dynamic and scalable way than before - more cost-effective than before due to the economy of scale and of sharing resources. Usually, cloud providers describe their promised behavior - regarding functional and non-functional aspects of the service provision - by way...

    Provided By Technische Universitat Clausthal

  • White Papers // Dec 2012

    A Polynomial Time Version of LLL with Deep Insertions

    Lattice reduction algorithms have numerous applications in number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction is the LLL algorithm. In polynomial time it computes a reduced basis with provable output quality. One early improvement of the LLL algorithm was LLL with deep insertions...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2012

    Authenticity, Integrity and Proof of Existence for Long-Term Archiving: A Survey

    Electronic archives are increasingly being used to store information that needs to be available for a long time such as land register information and medical records. In order for the data in such archives to remain useful, their integrity and authenticity must be protected over their entire life span. Also,...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2012

    Entangled Cloud Storage

    The terminology "Cloud Computing" refers to a paradigm shift in which applications from a server are executed and managed through a client's web browser, with no installed client version of an application required. This new paradigm - also known as the software as a service paradigm - has generated new...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    IVu.KOM: A Framework for Viewer-Centric Mobile Location-Based Services

    Users, especially when in unfamiliar areas, would appreciate services that provide them with information about their surroundings and objects in the neighborhood. A natural way to find such information is by looking at the objects. Therefore, it would be very useful if Location-based Services could provide a kind of viewer-centric...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Designing a Sensor Network Testbed for Smart Heterogeneous Applications

    Future buildings and environments are envisioned to provide ambient intelligence, adapting to a user's preferences based on information about his context and status. Smart heterogeneous sensor networks are well suited data sources for such environments, because they allow for dynamic adaptation to newly added sensor types and novel tasks. Realistic...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    A Methodology for Wireless Sensor Network Prototyping With Sophisticated Debugging Support

    In this paper, the authors present a methodology for rapid prototyping of wireless sensor networks that allows embedding sophisticated debugging functionality in a mote prototype and thereby monitoring entire networks. They achieve this goal by combining two fundamental concepts: the use of a re-configurable sensor node prototype platform, and an...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    A Reconfigurable Prototyping Platform for Smart Sensor Networks

    In this paper, a new concept for a very flexible and modular prototype platform for rapid prototyping of wireless sensor networks is presented. The authors propose to use a FPGA with high gate count as core of the platform. The FPGA is utilized to attain 3 major goals for the...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications

    The presence of multimodal sensors on current mobile phones enables a broad range of novel mobile applications including, e.g., monitoring noise pollution or traffic and road conditions in urban environments. Data of unprecedented quantity and quality can be collected and reported by a possible user base of billions of mobile...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Developing a Debugging Interface for Reconfigurable Wireless Sensor Nodes

    Wireless Sensor Networks (WSNs) consist of small, autonomous nodes (motes) which combine sensing, computing and wireless transmitting capabilities. Deployed in an application scenario, the motes can take sensor measurements, process the gathered data, and subsequently send the results to other motes or external devices using the on-board radio transmitter. Many...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    PUFs: Myth, Fact or Busted? a Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

    Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the security features of PUFs are still under investigation: evaluation results in the literature are difficult to compare due to varying test conditions, different...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Long Term Confidentiality: A Survey

    Consider the following scenario: Alice encrypts her data today using the most trusted computationally secure cryptosystem. An adversary Eve gains access to the encrypted data and stores it in a safe place. Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange

    An authentication factor is used to produce some evidence that an entity at the end of the communication channel is the one which it claims to be. Modern computer security knows different types of authentication factors, all of which are widely used in practice. Their standard classification considers three main...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2012

    Trainspotting: Combining Fast Features to Enable Detection on Resource-Constrained Sensing Devices

    This paper focuses on spotting and classifying complex and sporadic phenomena directly on a sensor node, whereby a relatively long sequence of sensor samples needs to be considered at a time. Using fast feature extraction from streaming data that can be implemented on the sensor nodes, the authors show that...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2012

    A Publicly-Verifiable Mix-Net with Everlasting Privacy Towards Observers

    In this paper, the authors present a novel, publicly verifiable mixing scheme which has everlasting privacy towards observers: all the information published on the bulletin board by the mixes (audit information etc) reveals no information about the identity of any of the messages published. The correctness of the mixing process...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2012

    Jointly Optimizing the Virtual Noise Mask and the SNR Margin for Improved Service in XDSL Systems

    In Digital Subscriber Line (DSL) systems, the concept of Virtual Noise was introduced to improve the protection against fluctuating crosstalk and to increase link stability. This paper investigates the joint optimization of the Virtual Noise power spectral density and the initialization SNR margin. A new algorithm is developed for modems...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2012

    SmartTokens: Delegable Access Control with NFC-Enabled Smartphones

    Today's smartphones and tablets offer compelling computing and storage capabilities enabling a variety of mobile applications with rich functionality. The integration of new interfaces, in particular Near Field Communication (NFC) opens new opportunities for new applications and business models, as the most recent trend in industry for payment and ticketing...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2012

    Fast Indoor Radio-Map Building for RSSI-Based Localization Systems

    Wireless Indoor localization systems based on RSSI-values typically consist of an offline training phase and online position determination phase. During the offline phase, geo-referenced RSSI measurement, called fingerprints, are recorded to build a radiomap of the building. This radiomap is then searched during the position determination phase to estimate another...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2012

    Self-Interference Aware MIMO Filter Design for Non-Regenerative Multi-Pair Two-Way Relaying

    A multi-pair two-way relaying scenario with multi-antenna mobile stations is considered. The bidirectional communications between the mobile stations are supported by an intermediate non-regenerative multi-antenna relay station. It is assumed that the mobile stations can subtract the back-propagated self-interference. Different relay transceive filter design approaches which utilize the fact that...

    Provided By Technische Universitat Clausthal

  • White Papers // Jan 2012

    A Security Metrics Framework for the Cloud

    Cloud computing is redefining the on-demand usage of remotely-located, and highly available computing resources to the user. Unfortunately, while the many economic and technological advantages are apparent, the migration of key sector applications to the Cloud has been limited due to a major show-stopper: the paucity of quantifiable metrics to...

    Provided By Technische Universitat Clausthal

  • White Papers // Nov 2011

    Towards Taming Privilege-Escalation Attacks on Android

    Android's security framework has been an appealing subject of research in the last few years. Android has been shown to be vulnerable to application-level privilege escalation attacks, such as confused deputy attacks, and more recently, attacks by colluding applications. While most of the proposed approaches aim at solving confused deputy...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2011

    SmartMeter.KOM: A Low-Cost Wireless Sensor for Distributed Power Metering

    Most current smart metering solutions aim at increasing user awareness for their household's electrical energy consumption. Although some smart meters make use of wireless data transfers between their sensor and display units, their integration into existing wireless sensor networks is hampered by proprietary communication interfaces and their lack of re-programmability....

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2011

    A Multi-Threshold Approach for Efficient and User-Centric Event Transmission in Logistics Wireless Sensor Networks

    Wireless sensor networks provide a promising means to enable real-time monitoring of transport processes in logistics. In a corresponding logistics wireless sensor network, energy-efficient operation is mandatory. Cost efficiency and customer satisfaction are additional requirements to be explicitly considered, particularly in the application domain of logistics. As data transmission constitutes...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2011

    On the Integration of Wireless Sensor Networks and Smartphones in the Logistics Domain

    A promising application domain for wireless sensor networks is their use for real-time monitoring in logistics transport processes. Through a constant monitoring of environmental parameters which influence the condition of transported goods, they allow for early transmission of alert messages in case of critical situations. The stakeholders however only benefit...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2011

    Lightweight Remote Attestation Using Physical Functions

    Remote attestation is a mechanism to securely and verifiably obtain information about the state of a remote computing platform. However, resource-constrained embedded devices cannot afford the required trusted hardware components, while software attestation is generally vulnerable to network and collusion attacks. In this paper, the authors present a lightweight remote...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2011

    Re-Synchronizing Audio Watermarking After Non-Linear Time Stretching

    Digital audio watermarking today is robust to many common attacks, including lossy compression and digital-to-analogue conversion. One robustness and security challenge, still, is time-stretching. This operation speeds up or slows down the playback speed while preserving the tone pitch. Although inaudible for an uninformed listener if smoothly applied, time-stretching can...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2011

    Lightweight Remote Procedure Calls for Wireless Sensor and Actuator Networks

    This paper presents S-RPC, a lightweight framework for remote procedure calls on wireless sensor and actuator nodes. It enables seamless interoperability between nodes by offering a common interface to remote method invocations. In the past, communication between these embedded devices has been realized over proprietary protocols specifically tailored for the...

    Provided By Technische Universitat Clausthal

  • White Papers // Dec 2010

    Linear Recurring Sequences for the UOV Key Generation

    Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in the post-quantum world. Due to its high efficiency and modest computational requirements, multivariate cryptography seems especially appropriate for signature schemes on low cost devices. However, multivariate schemes are not much used yet, mainly...

    Provided By Technische Universitat Clausthal

  • White Papers // Dec 2010

    Distributed Execution of S-BPM Business Processes

    Subject-oriented Business Process Management (S-BPM) introduces a new technique for process modeling that emphasizes the importance of the actors in business processes (subjects) and gives a balanced consideration to subjects, their actions, and goals. Because of the formal foundation and the clear declaration of subjects, S-BPM allows the distributed modeling...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Long Term Confidentiality: A Survey

    Consider the following scenario: Alice encrypts her data today using the most trusted computationally secure cryptosystem. An adversary Eve gains access to the encrypted data and stores it in a safe place. Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2012

    A Publicly-Verifiable Mix-Net with Everlasting Privacy Towards Observers

    In this paper, the authors present a novel, publicly verifiable mixing scheme which has everlasting privacy towards observers: all the information published on the bulletin board by the mixes (audit information etc) reveals no information about the identity of any of the messages published. The correctness of the mixing process...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2012

    SmartTokens: Delegable Access Control with NFC-Enabled Smartphones

    Today's smartphones and tablets offer compelling computing and storage capabilities enabling a variety of mobile applications with rich functionality. The integration of new interfaces, in particular Near Field Communication (NFC) opens new opportunities for new applications and business models, as the most recent trend in industry for payment and ticketing...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange

    An authentication factor is used to produce some evidence that an entity at the end of the communication channel is the one which it claims to be. Modern computer security knows different types of authentication factors, all of which are widely used in practice. Their standard classification considers three main...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks

    Conditions such as wireless data transmission and lack of a communication infrastructure turn Mobile Ad-hoc NETworks (MANETs) into a challenging environment from the perspective of security. Various kinds of misbehavior were identified. The authors present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2011

    SmartMeter.KOM: A Low-Cost Wireless Sensor for Distributed Power Metering

    Most current smart metering solutions aim at increasing user awareness for their household's electrical energy consumption. Although some smart meters make use of wireless data transfers between their sensor and display units, their integration into existing wireless sensor networks is hampered by proprietary communication interfaces and their lack of re-programmability....

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2011

    On the Integration of Wireless Sensor Networks and Smartphones in the Logistics Domain

    A promising application domain for wireless sensor networks is their use for real-time monitoring in logistics transport processes. Through a constant monitoring of environmental parameters which influence the condition of transported goods, they allow for early transmission of alert messages in case of critical situations. The stakeholders however only benefit...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2011

    A Multi-Threshold Approach for Efficient and User-Centric Event Transmission in Logistics Wireless Sensor Networks

    Wireless sensor networks provide a promising means to enable real-time monitoring of transport processes in logistics. In a corresponding logistics wireless sensor network, energy-efficient operation is mandatory. Cost efficiency and customer satisfaction are additional requirements to be explicitly considered, particularly in the application domain of logistics. As data transmission constitutes...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Privacy-Preserving Collaborative Path Hiding for Participatory Sensing Applications

    The presence of multimodal sensors on current mobile phones enables a broad range of novel mobile applications including, e.g., monitoring noise pollution or traffic and road conditions in urban environments. Data of unprecedented quantity and quality can be collected and reported by a possible user base of billions of mobile...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2011

    Lightweight Remote Procedure Calls for Wireless Sensor and Actuator Networks

    This paper presents S-RPC, a lightweight framework for remote procedure calls on wireless sensor and actuator nodes. It enables seamless interoperability between nodes by offering a common interface to remote method invocations. In the past, communication between these embedded devices has been realized over proprietary protocols specifically tailored for the...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    PUFs: Myth, Fact or Busted? a Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

    Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the security features of PUFs are still under investigation: evaluation results in the literature are difficult to compare due to varying test conditions, different...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2012

    Entangled Cloud Storage

    The terminology "Cloud Computing" refers to a paradigm shift in which applications from a server are executed and managed through a client's web browser, with no installed client version of an application required. This new paradigm - also known as the software as a service paradigm - has generated new...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2012

    Authenticity, Integrity and Proof of Existence for Long-Term Archiving: A Survey

    Electronic archives are increasingly being used to store information that needs to be available for a long time such as land register information and medical records. In order for the data in such archives to remain useful, their integrity and authenticity must be protected over their entire life span. Also,...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    IVu.KOM: A Framework for Viewer-Centric Mobile Location-Based Services

    Users, especially when in unfamiliar areas, would appreciate services that provide them with information about their surroundings and objects in the neighborhood. A natural way to find such information is by looking at the objects. Therefore, it would be very useful if Location-based Services could provide a kind of viewer-centric...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2010

    SFHC.KOM: Stateful Header Compression for Wireless Sensor Networks

    Nodes in wireless sensor networks are generally confined in the energy budget available for their operation, hence energy-aware application design is mandatory to achieve long node lifetimes. Radio transmissions represent an inherent, but energetically costly characteristic of sensor networking. Significant reductions in the overall energy consumption can thus be achieved...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2010

    A Concept for Cross-Layer Optimization of Wireless Sensor Networks in the Logistics Domain by Exploiting Business Knowledge

    Energy is limited in wireless sensor networks due to mostly battery-operated wireless sensor nodes. Consequently, an efficient energy usage significantly enhances the lifetime of a wireless sensor network. In this paper, the authors propose a cross-layer optimization concept that exploits business knowledge in the logistics domain to adapt communication by...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Describing Packet Payload Structures Using Lightweight Semantic Data Type Annotations

    In the majority of wireless sensor networks, packet structures are statically defined at design time. At runtime, sensed data is then inserted into the payload fields prior to packet transmission. While this is efficient in terms of the required processing, the packet structure cannot be modified during runtime. However, in...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Deployment of Wireless Sensor Networks in Logistics - Potential, Requirements, and a Testbed

    With the growing demand for extensive monitoring of transport processes in logistics and approaches for an event-based management of logistics processes, wireless sensor network technology has become a promising technology for this domain. In the first part of this paper, the authors describe such application possibilities for wireless sensor networks...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Exploring the Applicability of Participatory Sensing in Emergency Scenarios

    In emergency scenarios, rescuers need specific information about the affected areas. Such information are normally collected by sensors, but sometimes they could not be available because, as a consequence of a disaster, the pre-deployed infrastructure might be damaged, and rescue teams could not easily deploy new sensors in unfavorable conditions....

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Fine-Grained Access Control Enabling Privacy Support in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are deployed to cover a wide range of scenarios ranging from environmental monitoring to medical applications. However, some deployments raise privacy concerns. The threats to privacy are directly identifiable in people-centric scenarios. However, environment-centric scenarios may also threaten the privacy of persons located in the monitored...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2010

    Sorting the Wheat From the Chaff: Adaptive Sensor Selection for Context-Aware Applications

    Context-aware applications base their services on contextual information that can be queried from the sensors embedded in the environment. However, when the number of sensors and the applications using them increases, sensor query becomes on one hand a resource hungry task, e.g. for network bandwidth and energy needed to power...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

    Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, the minimization of its activity periods and efficient use of...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Towards Seamless Binding of Context-Aware Services to Ubiquitous Information Sources

    The area of context-aware computing has received much attention in the last decade. However, many systems to determine a user's context are focused on integrating a confined set of sensors into their decision-making algorithms, and lack extensibility for new and novel sources of context information. This limitation however has often...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks

    In wireless sensor networks, energy is commonly a scarce resource, which should be used as sparingly as possible to allow for long node lifetimes. It is therefore mandatory to put a focus on the development of energy-efficient applications. In this paper, the authors analyze the achievable energy gains when packet...

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2009

    Stream-Oriented Lossless Packet Compression in Wireless Sensor Networks

    In wireless sensor networks, the energy consumption of participating nodes has crucial impact on the resulting network lifetime. Data compression is a viable approach towards preserving energy by reducing packet sizes and thus minimizing the activity periods of the radio transceiver. In this paper, the authors propose a compression framework...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Designing a Sensor Network Testbed for Smart Heterogeneous Applications

    Future buildings and environments are envisioned to provide ambient intelligence, adapting to a user's preferences based on information about his context and status. Smart heterogeneous sensor networks are well suited data sources for such environments, because they allow for dynamic adaptation to newly added sensor types and novel tasks. Realistic...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    A Methodology for Wireless Sensor Network Prototyping With Sophisticated Debugging Support

    In this paper, the authors present a methodology for rapid prototyping of wireless sensor networks that allows embedding sophisticated debugging functionality in a mote prototype and thereby monitoring entire networks. They achieve this goal by combining two fundamental concepts: the use of a re-configurable sensor node prototype platform, and an...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    A Reconfigurable Prototyping Platform for Smart Sensor Networks

    In this paper, a new concept for a very flexible and modular prototype platform for rapid prototyping of wireless sensor networks is presented. The authors propose to use a FPGA with high gate count as core of the platform. The FPGA is utilized to attain 3 major goals for the...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Developing a Debugging Interface for Reconfigurable Wireless Sensor Nodes

    Wireless Sensor Networks (WSNs) consist of small, autonomous nodes (motes) which combine sensing, computing and wireless transmitting capabilities. Deployed in an application scenario, the motes can take sensor measurements, process the gathered data, and subsequently send the results to other motes or external devices using the on-board radio transmitter. Many...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Allowing Early Inspection of Activity Data From a Highly Distributed Bodynet With a Hierarchical-Clustering-of-Segments Approach

    The output delivered by body-wide inertial sensing systems has proven to contain sufficient information to distinguish between a large numbers of complex physical activities. The bottlenecks in these systems are in particular the parts of such systems that calculate and select features, as the high dimensionality of the raw sensor...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2012

    Trainspotting: Combining Fast Features to Enable Detection on Resource-Constrained Sensing Devices

    This paper focuses on spotting and classifying complex and sporadic phenomena directly on a sensor node, whereby a relatively long sequence of sensor samples needs to be considered at a time. Using fast feature extraction from streaming data that can be implemented on the sensor nodes, the authors show that...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2012

    Fast Indoor Radio-Map Building for RSSI-Based Localization Systems

    Wireless Indoor localization systems based on RSSI-values typically consist of an offline training phase and online position determination phase. During the offline phase, geo-referenced RSSI measurement, called fingerprints, are recorded to build a radiomap of the building. This radiomap is then searched during the position determination phase to estimate another...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Towards Declarative Query Scoping in Sensor Networks

    In the last decade, several large-scale wireless sensor networks have been deployed to monitor a variety of environments. The declarative nature of the database approach for accessing sensor data has gained great popularity because of both its simplicity and its energy-efficient implementation. At the same time another declarative abstraction made...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2010

    An On-Line Piecewise Linear Approximation Technique for Wireless Sensor Networks

    Many sensor network applications observe trends over an area by regularly sampling slow-moving values such as humidity or air pressure (for example in habitat monitoring). Another well-published type of application aims at spotting sporadic events, such as sudden rises in temperature or the presence of methane, which are tackled by...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes

    Multivariate cryptography is one of the main candidates to guarantee the security of communication in the post-quantum era. Especially in the area of digital signatures, multivariate cryptography offers a wide range of practical schemes. In Petzoldt et al. showed a way to speed up the verification process of improved variants...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Improvement and Efficient Implementation of a Lattice-based Signature Scheme

    Lattice-based signature schemes constitute an interesting alternative to RSA and discrete logarithm based systems which may become insecure in the future, for example due to the possibility of quantum attacks. A particularly interesting scheme in this context is the GPV signature scheme [GPV08] combined with the trapdoor construction from Micciancio...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2009

    Data Centric Peer-to-Peer Communication in Power Grids

    The authors study the use of peer-to-peer based declarative data management to enable efficient monitoring and control of power transmission and distribution networks. They propose methods and an architecture for data centric communication in power networks; a proof-of-concept decentralized communication infrastructure is presented that uses and advances state of the...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Iterative Dual Downlink Beamforming for Cognitive Radio Networks

    The authors address the problem of multi-user downlink beamforming and power allocation in a Cognitive Radio (CR) Secondary Network (SN) with constraints on the total interference in the Primary Network (PN). They derive the Lagrange dual of the problem and show that both problems are equivalent. Two algorithms are proposed...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2012

    Jointly Optimizing the Virtual Noise Mask and the SNR Margin for Improved Service in XDSL Systems

    In Digital Subscriber Line (DSL) systems, the concept of Virtual Noise was introduced to improve the protection against fluctuating crosstalk and to increase link stability. This paper investigates the joint optimization of the Virtual Noise power spectral density and the initialization SNR margin. A new algorithm is developed for modems...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2012

    Self-Interference Aware MIMO Filter Design for Non-Regenerative Multi-Pair Two-Way Relaying

    A multi-pair two-way relaying scenario with multi-antenna mobile stations is considered. The bidirectional communications between the mobile stations are supported by an intermediate non-regenerative multi-antenna relay station. It is assumed that the mobile stations can subtract the back-propagated self-interference. Different relay transceive filter design approaches which utilize the fact that...

    Provided By Technische Universitat Clausthal